The Cybersecurity Mesh Architecture (2025) by Kumar T
The Cybersecurity Mesh Architecture (2025) by Kumar T
Mesh
Architecture
Composable, flexible, and scalable
security approach
for a resilient security ecosystem
Tarun Kumar
www.bpbonline.com
First Edition 2025
Copyright © BPB Publications, India
ISBN: 978-93-65891-218
All Rights Reserved. No part of this publication may be reproduced, distributed or transmitted in any
form or by any means or stored in a database or retrieval system, without the prior written permission
of the publisher with the exception to the program listings which may be entered, stored and executed
in a computer system, but they can not be reproduced by the means of publication, photocopy,
recording, or by any electronic and mechanical means.
www.bpbonline.com
Dedicated to
My beloved wife:
Kanchan Bhatia Kumar
and
My son Vihaan Kumar
About the Author
We reside in a world where the field of cyber threats is enormous and ever-
evolving. Every new security solution/tool seems to result in newer ways
for attackers to circumvent defenses.
The one standout pluck from the book is that a robust cybersecurity posture
in today’s times necessitates the amalgamation of and partnership
(collaboration) between the various security solutions/tools that have been
deployed.
Contemporary technology stacks are extensively distributed and often
difficult to manage when separated into individual Silos. Hence, partnership
(collaboration), integration, and aggregation are critical features of a
successful cybersecurity strategy.
The book explores the concept of Cybersecurity Mesh Architecture
(CSMA). After reading through all chapters, readers will appreciate the fact
that CSMA is a valuable asset to enterprises (businesses) since it is an
architectural philosophy that advocates solution/tool integration and data
aggregation to achieve the desired outcomes. It also provisions for security
analytics, integrated threat intelligence/dashboards, and automation
supported by AI to achieve a cybersecurity posture that is dynamic and
capable of responding swifter than attackers.
This book is suitable for students who are studying cybersecurity as a
subject in their bachelor/master programs. It is also written for technical
readers with a basic understanding of cybersecurity and networking
technologies and their challenges.
This book is a resource that will enable you to have more trust in your
knowledge of CSMA. I hope you will find this book informative and
helpful.
Chapter 1: Cybersecurity: A Dynamic Changing Paradigm – This
chapter reviews the chronology of the evolution of cybersecurity, presents a
detailed overview of some noteworthy cybersecurity events (2010 – to
date), takes a look at some major trends that had a noteworthy impact on
cybersecurity, and examines the building blocks of cybersecurity and
traditional cybersecurity measures.
Chapter 2: Cybersecurity: Understanding Today’s Security Challenges
– This chapter covers topics such as distributed systems, examines the
security challenges of distributed systems, and presents details about
cybersecurity threats, attacks, and key issues in the digital age.
Chapter 3: Emerging Cybersecurity Trends – In this chapter, we will
explore the cybersecurity trends of today and the future, concentrating on
presenting the common themes in these trends. This chapter also allows the
reader to understand the importance of cyber resilience.
Chapter 4: The Need for Cybersecurity Mesh Architecture –This
chapter presents the current situation of the cybersecurity ecosystem,
explains CSMA, and illustrates its layers, needs, and benefits.
Chapter 5: Fundamental Components of Cybersecurity Mesh
Architecture – This chapter gives special attention to the key components
of CSMA, discusses the outcome of the adoption of CSMA, a unified
architecture and provides a sneak preview of CSMA products/solutions.
Chapter 6: How to Effectively Adopt Cybersecurity Mesh Architecture
– This chapter reassesses the cybersecurity landscape of today, elaborates
on the key aspects of CSMA adoption, provides directions on how to get
started with CSMA, and discusses the key factors of consideration while
adopting CSMA.
Chapter 7: Benefits of Adopting Cybersecurity Mesh Architecture –
This chapter emphasizes the necessity of CSMA and the benefits of
leveraging CSMA. The chapter then discusses the characteristics of a
CSMA strategy and presents a few target use cases. Furthermore, it details
the features to be considered for CSMA solutions and presents the pitfalls
of not leveraging CSMA.
Chapter 8: CSMA Best Practices – In this chapter, we will compare
CSMA with the traditional defense-in-depth approach and re-visit the
salient points and goals. We will also discuss a systematic approach to
implementing CSMA and take a look at the KPIs for assessing the
effectiveness of the implementation of CSMA. The chapter also covers the
commandments of CSMA and discusses the challenges in implementing
CSMA.
Chapter 9: Potential Outlook for CSMA Adoption – This chapter will
cover three distinct use cases in different environments where CSMA works
[viz., work from home, cloud, and operational technology (OT)]. The
chapter will also examine the use of CSMA in the healthcare sector and
take a look at the CSMA market overview, its growth factors, dynamics,
and growth opportunities.
Coloured Images
Please follow the link to download the
Coloured Images of the book:
https://rebrand.ly/75e90aj
We have code bundles from our rich catalogue of books and videos
available at https://github.com/bpbpublications. Check them out!
Errata
We take immense pride in our work at BPB Publications and follow best
practices to ensure the accuracy of our content to provide with an indulging
reading experience to our subscribers. Our readers are our mirrors, and we
use their inputs to reflect and improve upon human errors, if any, that may
have occurred during the publishing processes involved. To let us maintain
the quality and help us reach out to any readers who might be having
difficulties due to any unforeseen errors, please write to us at :
[email protected]
Your support, suggestions and feedbacks are highly appreciated by the BPB
Publications’ Family.
Did you know that BPB offers eBook versions of every book published, with PDF and ePub files
available? You can upgrade to the eBook version at www.bpbonline.com and as a print book
customer, you are entitled to a discount on the eBook copy. Get in touch with us at :
[email protected] for more details.
At www.bpbonline.com, you can also read a collection of free technical articles, sign up for a range
of free newsletters, and receive exclusive discounts and offers on BPB books and eBooks.
Piracy
If you come across any illegal copies of our works in any form on the internet, we would be grateful
if you would provide us with the location address or website name. Please contact us at
[email protected] with a link to the material.
Reviews
Please leave a review. Once you have read and used this book, why not leave a review on the site that
you purchased it from? Potential readers can then see and use your unbiased opinion to make
purchase decisions. We at BPB can understand what you think about our products, and our authors
can see your feedback on their book. Thank you!
For more information about BPB, please visit www.bpbonline.com.
10. Index
CHAPTER 1
Cybersecurity: A Dynamic Changing
Paradigm
Introduction
Not only have the domains of cybersecurity and technology advanced but
also have criminals/bad actors who aim to exploit weaknesses in the system
for personal gain. Likewise, cybersecurity and cybercrime have
progressively developed from the 1940s to the present, and this chapter
explains the evolution of cyberattacks and security solutions.
Structure
In this chapter, we will cover the following topics:
Evolution of cybersecurity
Notable cybersecurity events
Notable shifts impacting cybersecurity
Cybersecurity threats evolution
Building blocks of cybersecurity
Traditional cybersecurity measures
Objectives
When we are asked when cybersecurity started, an instant answer, in most
cases, is when the Internet started. Essentially, in this chapter, we shall
realize that the cybersecurity industry has been growing since the 1940s.
Even when networks did not exist, theorists were getting prepared for the
risks that may emerge with the advancement of technology.
In this chapter, we will explore the history and evolution of cybersecurity
—from the age of the first computer threats to the rise of risks due to the
advent of artificial intelligence and cloud computing.
Evolution of cybersecurity
The evolution of cybersecurity has been hand in glove with the
developments in communication technology. Thereafter, its evolution has
been influenced by developments in geopolitical tensions and major global
events.
For the sake of discussion, let us keep our focus on developments in
technology. Over the years, we have progressed from telegraphs to
smartphones. With this, the types of cyberattacks have transformed from
Morris Worm (refer to The first DoS attack section) to Stuxnet (refer to
Stuxnet section for details), to Snake ransomware. Also, to secure data and
communication, we have dealt with simple ciphers to sophisticated
algorithms.
There have been umpteen incidents in our history that have influenced the
developments in cybersecurity. However, it is not feasible to describe all of
them. While we look back in history, some crucial junctures need to be
given their due importance and thus cannot go unnoticed.
Let us take the time capsule and go back to the 1940s.
Connected world
This decade gave us the growth and development of the Internet (beyond
proportions). The cybersecurity domain expanded along with it. Many
significant developments in computer security took place in this decade,
such as:
The Anonymous
2003 saw the debut of Anonymous, a popular hacktivist group. The
objective of carrying out attacks by the group is to expose high-profile
targets and garner attention regarding its political views.
Operation Aurora
Until now, no one had thought that Cyber operations could be used as a tool
to carry out industrial espionage at a large scale. Operation Aurora, a series
of cyberattacks brought this to the fore. The attack was sponsored by the
Chinese Government and targeted the intellectual property of many U.S.
private-sector companies, including Google, Yahoo, and Adobe.
Stuxnet
Multiple Windows zero-day vulnerabilities were exploited by Stuxnet (a
sophisticated computer worm). It is alleged to have been created by a secret
U.S.-Israeli program to target and destroy centrifuges at the uranium
enrichment facility in Iran, causing extensive damage to its nuclear
program.
Cybercriminals had newer opportunities to exploit owing to the increase in
connectedness and ongoing digitization.
The X hack
This year witnessed dramatic cybersecurity incidents that involved X
(formerly Twitter) accounts of prominent users getting hacked.
A new category of the breach was coined with this, viz., Insider Threat.
Whether it is the actions of a negligent employee/or malicious insider, it
went on to showcase that humans are the weakest link in the cybersecurity
chain.
Events in 2013
Some of the noteworthy events of 2013 are listed as follows:
Events in 2014
Some of the noteworthy events of 2014 are listed below:
Globally, it is reported that the number of data breaches in 2014 was about
50% more as compared to 2013.
Events in 2017
Some of the noteworthy events of 2017 are listed below:
Events in 2018
Some of the noteworthy events of 2018 are listed as follows:
Events in 2019
Some of the noteworthy events of 2019 are listed as follows:
Singapore’s health sectors’ breaches: 30+ breaches took place in
Singapore’s healthcare sector in 2019 alone. The number increased to
80+ in 2020.
Attacks on the New Zealand stock market: New Zealand’s stock
market came to a grinding halt due to multiple DDoS attacks.
Events in 2020
This was the year of COVID-19 and proved challenging for cybersecurity
professionals. The year witnessed cybercriminals continued illegal
activities. Some of the important data breaches of 2020 are listed below:
Multi-factor authentication
Due to numerous massive data breaches (high-profile
cyberattacks), the use of MFA has been widespread.
MFA protects data and it is now almost mandatory (become the default) for
all websites to implement the same.
We have covered a brief history of cybersecurity (1940-Present). We then
looked at some notable cybersecurity events from 2010 to date) and then
delved into what we believe were the major shifts that had a remarkable
impact on cybersecurity.
In summary, these times have witnessed a sea change concerning
technological advancements and their impact on cybersecurity.
Cybercriminals have continuously been bestowed with new opportunities to
exploit due to the increase in connectedness and the ongoing digitization in
most aspects of life. It is also evident that cyberattacks and Cybersecurity
measures have become sophisticated with time passing.
Here is another dimension to take cognizance of. With the world as
connected as it is, let us not forget that Cybersecurity is not only about
protecting computer systems but also about protecting people. People have
weaknesses, and, like computers, these vulnerabilities can be taken
advantage of. Emotional manipulation and social engineering are being
used by hackers to gain access to otherwise secure systems.
Discussion would be incomplete, if we do not mention that in
Cybersecurity, we must learn from our past mistakes, and apply the lessons
learned to prevent attacks in the future. This is where professionals such as
security researchers and ethical hackers come into the picture. The
collective effort of Cybersecurity professionals should be to discover and
fix vulnerabilities before they are exploited and help make us and our
computers safe.
Cybersecurity threats evolution
Cybersecurity threats have been advancing from time immemorial. This
section presents a unique perspective of how the threat landscape of cyber
threats has evolved periodically (say shifted constantly) over time. Up until
this point, we have seen the following five Life Stages (LS) of
cybersecurity threats:
LS 1: Virus
Refer to section Decade of Commercial Antivirus – The
1980s of this chapter, where we discussed how virus
attacks against standalone computers prompted the
creation of the first antivirus.
LS 2: Network
Refer to section Connected World – The 1990s, the
decade that gave us The Internet (growth and
development). When cyberattacks started coming in
through the Internet, a Firewall was designed to detect
and stop them.
LS 3: Applications
Due to the widespread exploitation of vulnerabilities
inside application software, security measures such as
the implementation of Intrusion Prevention Systems
(IPS) gathered pace.
LS 4: Payload
From the 1980s when the world saw the early
emergence of malware specimens till the advent of
Petya and NotPetya (the encrypting malware), malware
became more targeted. It was able to circumvent
signature-based defenses, and solutions such as Anti-bot
and Sandboxing became necessary to detect these
threats. Therefore, we refer to this advanced threat as
payload malware.
LS 5: Multi-vector
Most recent cyberattacks are large-scale and employ
multi-vector techniques. The growth in sophistication of
cyberattack techniques has rendered the previous forms
of Cybersecurity measures (solutions) less effective
over time. Cybersecurity solutions for LS 5 threats are
required to protect against the present cyber threat
landscape adequately. All we need now is advanced
threat protection solutions.
Points to remember
Cyber-attacks take pace daily and are evolving in sophistication
constantly
Milestone cybersecurity events have played a major role in what
cybersecurity is today
Everyone is susceptible to cyber-attacks
Cyber-attacks perpetrate from insiders as well (in addition from
outside)
It is imperative to stay alert and keep up with important industry trends
to keep attacks at bay
Cyber-attacks will continue to rise in future with their impact
becoming more consequence
Key terms
1. https://cybermagazine.com/cyber-security/history-cybersecurity
2. https://www.digitalguardian.com/blog/biggest-moments-
cybersecurity-history-past-10-years
Introduction
Through Chapter 1, Cybersecurity: A Dynamic Changing Paradigm, we
realize that the modern cybersecurity threat is complex, diverse, and
dynamic. Since time immemorial, we have seen new threats emerge every
year. While attackers continuously seek new ways to bypass defenses,
cybersecurity professionals are finding newer ways to secure sensitive data.
It would be fair to state that people on both sides of the equation (attackers
and defenders) are smart and determined.
One of the most significant developments in the cyber world, especially in
the last decade, is the expansion of the attack surface. Each end-point
(employees working from the office or home) or perimeter device (edge
devices, hybrid cloud systems) in an enterprise (business) is a potential
entrance (unauthorized) into its internal systems. What exacerbates the
issue is their growing numbers.
Let us now concentrate on the systems in an enterprise (business) that are
widely distributed in nature and on how their disparateness impacts
Cybersecurity. The modern-day infrastructure is not only disparate but also
increasing in breadth, which presents new and unique challenges to
cybersecurity operations.
Structure
In this chapter, we will cover the following topics:
Distributed systems
Security challenges of distributed systems
Digital age: Cybersecurity threats
Digital age: Cybersecurity key issues
Objectives
This chapter looks at how disparately distributed systems operate in today’s
enterprises (businesses) and their impact on cybersecurity. It will also
explore varied cybersecurity challenges (threats, attack vectors, and issues).
Distributed systems
Since there is never a one-size-fits-all solution, all large enterprises
(businesses) have highly distributed IT systems and face the consequences.
Each enterprise (business) has definite organizational and operational needs
that must be met, unique ecosystems that must be hardened, and limited
resources available to commit to Security Operations (SecOps).
Consider this common scenario through which enterprises (businesses)
distribute their systems: multiple campuses | Branch offices | Multiple
public clouds | Edge computing | IoT devices, etc. Many larger enterprises
(businesses) will have this distribution or may combine some of these
aspects. Now, think about the administrative complexities of managing
these resources.
For instance, say your business operations are spread across several offices.
Each office’s devices, network, and on-premises computing resources will
need to be secured. The enterprise (business) would likely be using cloud
technologies in day-to-day operations given its advantages in doing so.
Additionally, for each office, communications between public clouds and
on-premises devices/applications would need to be secured. Consequently,
the volume of data will increase, leading to an increase in log data to sift
through. There will also be a dire need for the right-set visibility of data
across the enterprise (business). This is how inherently the ecosystem of
distributed systems works.
Lack visibility
The ecosystem of any distributed system comprises many applications,
servers, and services. This makes the ecosystem difficult to monitor. On one
hand, there are many individual elements to monitor, and on the other hand,
there is log overload and complexity of communication that make it
difficult to see what is transpiring.
Traffic and activity monitoring thus becomes the main pain point as they
maneuver through the web of interconnected systems to find a threat’s
source. Though modern security solutions such as Security Information
and Event Management (SIEM) make it easy to monitor data, analyzing
this data is another story. The problem is simply the volume of data
generated with SIEM and other solutions. Owing to the overwhelming
amount of monitoring data, there is every chance of potential security
events (probably breaches) getting lost and unusual usage patterns getting
overlooked. Security professionals also suffer from burnout trying to sort
through the deluge of information.
The real problem is the visibility of events, not the number of alerts. Data
integration is a huge challenge in siloed security solutions (since a large
volume of logs and monitoring information comes from different
tools/separated regions of the ecosystem), leading to delays in properly
integrating that data.
Cybersecurity professionals do not have the luxury of time if a threat event
materializes. Any enterprise’ (business’s) effectiveness in responding to an
attack (its readiness) is assessed through a metric referred to as Mean Time
To Detect (MTTD). MTTD is the average time taken to detect a security
incident or failure from the time it takes place in a system. The longer a bad
actor has access to internal systems, the more damage they can do and the
more money and time it will cost an enterprise (business).
Another important metric in this context is Mean Time To Remediate
(MTTR). MTTR is the amount of time taken by an enterprise (business) to
neutralize an identified threat or failure within their network environment.
Threat remediation is the process used by enterprises (businesses) to
identify and resolve threats to their network environment. A threat is a
malicious intrusion/infiltration into a system to steal information (that
negatively affects operations and/or damages hardware or software).
MTTD and MTTR are vital metrics to consider when assessing the
effectiveness of any enterprise’s (business’s) security systems. With
maturity in the cybersecurity posture, these metrics should follow a
downward trend as time progresses.
Visibility is not a matter of knowing that an attack is occurring, what
matters is whether we have a proper understanding of the threat and
whether we have the required context. If, due to a vulnerable port in the
infrastructure, a network security alert is noticed, merely closing that port
might not be the whole solution. It is important to understand why that
specific network was compromised. Comprehensive visibility is required
for the cybersecurity staff to understand why the network was compromised
(was the device infected with malicious code?). In summary, modern IT
ecosystems are large and interconnected, so comprehensive visibility is the
key.
Difficult to manage
Distributed systems require well-defined policies to function properly
(policy consistency is difficult to maintain across siloed systems). In
security Silos, there are different tools/ solutions/resources with different
policy control requirements and needs. The policy controls may need to
change over time depending on operational requirements and the changing
threat landscape. In these scenarios, it is a must to stay agile and adapt to
new security threats. Essentially, every day sees new threats emerging and
changing attack patterns, prompting security teams to change strategies to
meet these new attacks.
Inconsistent application of policies is likely to produce redundant/false
alerts, leading to adverse impacts. Also, in siloed security systems, any
fixes (not well thought through) to complex problems are likely to create
new vulnerabilities.
Malware attacks
Malware, also known as malicious software, is the most common type of
cyberattack and covers viruses, worms, trojans, spyware, and ransomware.
Malware perpetrates a system via a link on an untrusted website/email/an
unwanted software download. It has a typical way of operation, firstly it
gets deployed on the target system, then starts collecting sensitive data,
manipulates the system, and may destroy data/or shut down the system
altogether.
Here are some of the main types of malware attacks:
Ransomware attacks
Ransomware is a type of malware in which the data on a victim's computer
is locked, and payment (monetary ransom) is demanded before the data is
unlocked. After successful payment, access rights are returned to the victim.
These attacks are perpetrated by cybercriminals or nation-state-sponsored
groups.
The earliest ransomware attacks simply demanded a ransom in exchange
for the encryption key needed to regain access to the affected data or use of
the infected device. By making regular or continuous data backups, an
organization could limit costs from these ransomware attacks and often
avoid paying the ransom demand.
However, in recent years, ransomware attacks have evolved to include
double-extortion and triple-extortion attacks that raise the stakes
considerably—even for victims who rigorously maintain data backups or
pay the initial ransom demand. Double-extortion attacks add the threat of
stealing the victim’s data and leaking it online; on top of that, triple-
extortion attacks threaten to use the stolen data to attack the victim’s
customers or business partners.
These attacks result in a crisis-level operational impact on critical
infrastructure and commercial enterprises (businesses), while criminals
threaten to publicly release or destroy data if prompt payment is not made.
In the past decade, ransomware attacks have evolved from a consumer-level
nuisance of fake antivirus products to sophisticated malware with advanced
encryption capabilities that now primarily target public and private-sector
enterprises (businesses).
Also, ransomware is now one of cybercrime’s most profitable and popular
business models. It has proven effective and profitable for enterprises.
Enterprises (businesses) need a powerful recovery strategy against
ransomware attacks. This involves proper planning to recover corporate and
customer data and applications.
Take a look at this, cybercriminals do not necessarily need to develop their
own ransomware. Some ransomware developers share their malware code
with cybercriminals via Ransomware-as-a-Service (RaaS) arrangements.
The cybercriminal, or affiliate, uses the code to carry out an attack, and then
splits the ransom payment with the developer. It is a mutually beneficial
relationship: affiliates can profit from extortion without having to develop
their own malware, and developers can increase their profits without
launching additional cyberattacks.
One of the best countermeasures against ransomware attacks is Disaster
Recovery as a Service (DRaaS) solution. DRaaS is a cloud computing
service model that allows an organization to back up its data and IT
infrastructure in a third-party cloud computing environment and provide all
the DR orchestration, all through a SaaS solution, to regain access and
functionality to IT infrastructure after a disaster (e.g., ransomware Attack).
With DRaaS solutions, enterprises (businesses) can automatically back up
files, easily identify which backup is clean, and launch a fail-over with the
press of a button when malicious attacks corrupt our data.
See how things evolve. Many had touted 2020 as the Year of Ransomware.
Then came 2021, 2022, and 2023 (and the trend continues).
Listed below are two reports about ransomware attacks:
Cryptojacking attacks
Cryptocurrency has become popular today. Cybercriminals hijack home or
work computers to mine for cryptocurrency (like Bitcoin). Mining requires
lots of computer processing power. Hence, hackers can make money by
stealthily piggybacking on someone’s computing resources. For enterprises
(businesses), cryptojacked systems can cause serious performance issues
and costly downtime.
Phishing attacks
A Phishing attack is a type of social engineering attack that targets users’
login details and credit card information (this user information benefits the
malicious actors). These attacks involve malicious actors to trick employees
into revealing sensitive information in many forms. Those forms include
email phishing and the more sophisticated and targeted spear phishing,
Business Email Compromise (BEC), whaling, and vishing attacks.
Here are some of the main types of phishing attacks:
Facebook and Google were scammed out of more than $100 million
after attackers impersonated a legitimate partner of the businesses
between 2013 and 2015. The phishing scams involved contracts and
invoices for funds due.
Sony Pictures was hacked in 2014 after company executives received
phishing emails from a group named Guardians of Peace. The
attackers reportedly stole more than 100 TB of data.
Austrian aircraft supplier FACC was defrauded of $54 million in 2016
after an employee was phished by an attacker, purporting to be the
company CEO, who requested a wire transfer to a bank account
controlled by the attackers.
Cloud attacks
Cloud computing is an innovative modern-day technology that
revolutionized the physical world of data storage. Cloud computing has led
to improvements in IT efficiency, and provided flexibility and scalability to
enterprises (businesses). Due to these advantages, enterprises (businesses)
from large to Micro, Small, and Medium Enterprises (MSMEs) utilize
cloud services for storing their data (that includes Corporate and user-
sensitive information). On the one hand, its adoption promises a reduction
in cost and increased efficiency; on the other, it opens possibilities for data
security breaches.
In cloud computing, enterprises (businesses) must understand the Cloud
shared responsibility model. The model is a working framework followed
by Cloud Service Providers (CSP) that details the responsibility over an
entire cloud environment, from infrastructure to hardware, data, identities,
workloads, network, settings, and more. Responsibility is divided between
the CSP and the customers. Many organizations cannot delineate where
CSP responsibilities end and their responsibilities begin, opening them to
numerous vulnerabilities.
The exploitation surface for cyber criminals has widened due to using cloud
computing services, and enterprises’ (businesses’) need to address this. The
main reasons for compromised data security/that present an opportunity for
cyber criminals to exploit are the lack of encryption, multi-factor
authentication, improper configuration, insecure APIs, poor access control,
shared tenancy, and supply chain vulnerabilities.
State-sponsored attacks
Hackers are eyeing to make a profit by stealing individual and corporate
data. Now, nation states are using their cyber skills to infiltrate other
governments and perform attacks on their critical infrastructure.
Cybercrime, which has been a major threat to the private sector and for
individuals so far, has now become a menace for the governments and
nations. As we move into the future, state-sponsored attacks are expected to
increase, with attacks particularly on critical infrastructure.
Insider attacks
All cybersecurity challenges in enterprises (businesses) do not come alone
from the outside; they come from within as well. Insider threats are threats
initiated by authorized users (who could be employees, contractors, or
business partners) who advertently or inadvertently misuse their legitimate
access or have their accounts hijacked by cybercriminals.
While it is the external threats that get noticed (become headlines), insider
threats, whether malicious or the result of negligence—can be costly and
dangerous for enterprises (businesses). For example, confidential data may
be leaked by employees (which can prove extremely detrimental as the data
can be used by its competitors. As a result, it can bring significant losses to
the company’s finances and reputation.
Look at these reports that indicate that data breaches due to insider threats
are costlier than data breaches due to external threats:
IBM’s 2023 report: average cost of a data breach ($4.90 million due
to insider threat versus $4.45 million due to external threat).
Verizon’s 2023 report: average compromises due to external threat of
~200 million records versus 1 billion records or more due to insider
threat.
Man-in-the-middle attack
This attack involves intercepting the communication between two
endpoints, such as a user and an application. The attacker can eavesdrop on
the communication, steal sensitive data, and impersonate each party
participating in the communication.
Some examples of MitM attacks include:
Denial-of-Service attack
This attack overloads the target system with a large volume of traffic,
hindering the ability of the system to function normally. An attack
involving multiple devices is known as a DDoS attack.
DoS attack techniques include:
Injection attacks
Injection attacks exploit various vulnerabilities to directly insert malicious
input into the code of a web application. Successful attacks may expose
sensitive information, execute a DoS attack, or compromise the entire
system.
Here are some of the main vectors for injection attacks:
Budgets issue
Cybersecurity is seen as a cost center by enterprises (businesses) because it
is difficult to calculate its return on investment (ROI). With time, as its
importance has increased, it has been relatively safe from the perspective of
budget and staff cuts. However, it is not immune from them. Chief
information security officers (CISOs) and security teams can face budget
cuts and reductions in spending (we saw this happen during COVID-19).
High-interest rates environment (as it is now), high inflation, recession
fears, and geopolitical uncertainty are all extraneous factors and will
continue to plague the IT industry (in response to which enterprises
(businesses) resort to budgets and staff cuts. In such circumstances, they
must plan carefully to maintain the security posture of their enterprise
(business) without burning themselves out. It is not easy to get more done
with less.
Conclusion
We now realize that cybersecurity risks are everywhere, hence
cybersecurity has become a dominant concern for all enterprises
(businesses), whether large, medium, or small. What is suggested here, is
for enterprises (businesses) to adopt and rigorously follow an industry-
accepted cybersecurity framework (e.g., NIST), conduct regular
assessments, and train their employees consistently to make them security
conscious. This is paramount in creating a secure digital environment.
Enterprises (businesses) should implement modern technologies such as
endpoint detection and response (EDR), adopt strong password
management, and conduct cloud security assessments to counter attacks
such as malware, ransomware, and phishing. Cybersecurity strategies have
to continually evolve and adapt to the changes in our digital frontier as the
threat attack surface expands. Cybersecurity should not be a mere tick mark
in the box. Financial and reputation implications on enterprises (businesses)
due to a cyberattack are immense, hence cybersecurity should be an integral
part of business strategy.
In the next chapter, we shall discuss the emerging cybersecurity trends in
details and understand their common themes. We shall also introduce the
subject of cyber resilience, its building blocks, and its importance for
enterprises (businesses).
Points to remember
Key terms
Security information and event management: A solution that helps
enterprises (businesses) to detect, analyze, and respond to security
threats before they can have adverse impact on its operations.
References
1. https://www.techtarget.com/searchsecurity/feature/Ranso
mware-trends-statistics-and-facts
2. https://www.cnbc.com/2019/03/27/phishing-email-scam-
stole-100-million-from-facebook-and-google.html
3. https://www.chegg.com/homework-help/questions-and-
answers/case-study-sony-pictures-entertainment-hack-
problem-november-24-2014-hacker-group-called-g-
q45826501
4. https://www.computerweekly.com/news/4500271523/54m
-cyber-fraud-hits-aircraft-supplier-share-price
5. https://www.techtarget.com/iotagenda/opinion/IoT-
trends-to-keep-an-eye-on
6. https://www.ibm.com/topics/insider-threats
7. https://www.nextdlp.com/resources/blog/seven-
takeaways-from-2023-verizon-data-breach-
investigations-report
CHAPTER 3
Emerging Cybersecurity Trends
Introduction
In the previous chapters, we looked at the chronology of the evolution of
cybersecurity, explored noteworthy cybersecurity events and their impact
on this domain, and also examined the building blocks of cybersecurity.
Further, we understood distributed systems, their workings, and challenges.
We then detailed cybersecurity threats, attacks, and key issues and further
discussed how to secure digital boundaries.
In this chapter, we will explore some prominent cybersecurity trends (and
their characteristics) that are present and emerging due to the change in the
threat landscape owing to our ever-increasing reliance on digital technology
for conducting business.
Structure
In this chapter, we will cover the following topics:
Cybersecurity trends
Cyber security future trends
Common themes in trends
Understanding cyber resilience
Objectives
Cybersecurity has become a vital objective for enterprises (businesses) to
protect data from online threats and unauthorized intrusions. Cybersecurity
trends have evolved with technological advances, and data breaches,
ransomware attacks, and cyber hacks have increasingly become
commonplace.
Cybersecurity trends
With the increase in reliance on digital technology for communication,
commerce, and critical infrastructure, the threat landscape has evolved in
complexity and sophistication. In this section, we will explore some of the
prominent (20 nos.) cybersecurity trends and the challenges they pose to
individuals, enterprises (businesses), and governments.
Figure 3.1 depicts the first five (1-5) cybersecurity trends (with trends 6-20
to follow in continuation):
Conclusion
Cyber resiliency in today’s digital world has become a necessity. It is
therefore important that enterprises (businesses) adopt an approach that is
proactive and adaptive which will enable them to maneuver through the
changing threat landscape. Cyber resilience is an ongoing process that
requires 3Cs (commitment, collaboration, and continuous improvement) to
stay ahead of the curve.
In the next chapter, we will understand Cyber Security Mesh Architecture
(CSMA), examine its need CSMA, and detail the benefits of its adoption.
Points to remember
Key terms
Introduction
So far, we have learned how cybersecurity has evolved dynamically over
time, we then concentrated on the cyberattacks and challenges being faced
by enterprises (businesses), and explored prominent cybersecurity trends
emerging due to the change in the threat landscape.
Let us now take a solutions-oriented approach and discuss cyber risk
management. Simplistically, it is about assessing what could potentially go
wrong and then deciding on the best approaches/solutions to
prevent/minimize it. In today's world, both the government and private
sectors must manage any cybersecurity threat.
Let us remember the impact COVID had on enterprises (businesses). It has
pressed enterprises (businesses) to what we refer to as an edgeless digital
infrastructure that changes constantly expanding its attack surface. What
have the enterprises (businesses) done in these situations? They have
employed new technologies across their infrastructure.
We now have distinct environments to take care of viz., work-from-home,
on-premise office infrastructure (traditional), and multi-cloud data centers.
Not only has the complexity of safeguarding this attack surface increased
(through tools) but also the management of these tools has added to the
complexity (which is often done by different teams).
It is reasonable enough to state that the cybersecurity industry is at a tipping
point.
Structure
In this chapter, we will cover the following topics:
Objectives
In this chapter, we will introduce CSMA and examine its needs and benefits
for enterprises (businesses). We shall also understand the various challenges
that the cybersecurity architectures of today are facing.
Note: CSMA is not prescriptive; rather, it is a framework that is interoperable and enables
disparate cybersecurity services to work together.
Benefits of CSMA
It is not adequate to meet today’s demands that are rapidly changing with
the existing approaches related to identity and cybersecurity architectures.
Existing approaches are quite disjointed. Therefore, the growing digital
landscape which is complex requires a new approach to cybersecurity
architecture. This is where the CSMA kicks in.
The basic objective of CSMA is to provide a common ground and a united
security framework to secure assets (on-premises and /or in the cloud).
CSMA enables point (stand-alone) cybersecurity solutions to work in an
integrated manner (also standardized) and bring about an improvement in
the overall security posture of the enterprise (business).
CSMA's further objective is to reduce the time required to collect and
organize security data, which can lend the enterprise (business) more time
to plan and respond to threats. Enterprises (businesses) need a platform that
performs this, which can be advantageous to IT/security operations. That is
just a baseline of what CSMA can assist with. Cybersecurity meshes can go
the extra mile by increasing visibility in the cybersecurity ecosystem,
reducing complexity in operations, and enhancing the sharing of security
intelligence across the enterprise (business).
Figure 4.9 illustrates a list of the various benefits of adopting CSMA:
Enhancement of visibility
As discussed in Chapter 2, Cybersecurity: Understanding Today’s Security
Challenges, visibility is construed as being able to see and understand
various components of a cybersecurity infrastructure in a distributed
ecosystem. Also, in line with what is mentioned in the preceding paragraph,
CSMA follows an approach that is centered around the integration of
systems, thereby leading to increased visibility predominantly through
aggregation of security data and centralization of detection information.
The seamless aggregation permits the cybersecurity teams to distinguish
patterns easily in their data, which is the key.
Figure 4.10 portrays an eye to showcase how clearly various components of
a cybersecurity ecosystem can be seen:
Figure 4.10: Visibility illustration
CSMA gathers the output from various systems (e.g., by way of integrating
existing collected data and those from threat detection tools such as
Firewalls, access management/ identity, EDR, etc.) and further carries out
processing/analysis. This eventually leads to the end goal of CSMA, which
is to assist cybersecurity teams in gaining meaningful threat intelligence
(inferences).
CSMA also helps in the identification of patterns in security data that are
aggregated and can determine some of the attacks that may be well-hidden.
CSMA works to minimize the limitations of a distributed system where
security data is generated across various devices/tools, making it difficult to
correlate events. Let us learn this through an example. A cybersecurity
analyst observes an increase in usage of a computing resource on a server in
the cloud and would seem normal contextually. When seen in combination
with an IAM incident and event on the network, there could be a real cloud
security issue/event.
Let us reiterate what we have learned. Gaining visibility of data from
separate cybersecurity solutions is not adequate rather a cybersecurity
infrastructure (CSMA) is needed which enables cybersecurity teams to
better understand the connections between various components in the
ecosystem.
Reduction in complexity
In the case of cybersecurity, increased data aggregation usually goes hand-
in-hand with a reduction in overall complexity. Siloed security resources are
difficult to manage, as each section of an enterprise’ (business’) security
ecosystem will have different operational upkeep needs, and this kind of
structure can separate experts who should be communicating with one
another.
Figure 4.11 provides an expression of the state of being intricate or
complicated (aka maze):
Enhanced automation
Attackers are known to be getting advanced with time and they are well-
synchronized. They always attempt to work in a stealthy manner such that
their attack goes unnoticed (rather than make it difficult to detect). We are
increasingly observing the use of attacks using AI. This makes it difficult to
respond to such attacks in time despite cybersecurity professionals working
overtime (shall we say, against time).
Figure 4.13 illustrates automation, the method of making a device, a
process, or a system operate by itself:
Figure 4.13: Automation illustration
The need of the hour for these professionals is AI-based automation which
can work across the cybersecurity ecosystem to adequately address the risks
posed by weaponization of AI.
Security analytics
We have observed that enterprises (businesses) use multiple cybersecurity
analytics tools together with other analytics tools. There are two problems
with this setup. Firstly, most of the analytics tools are domain-specific,
secondly, these tools do not work in a unified manner.
Figure 4.15 depicts a cybersecurity approach that uses data collection, data
aggregation and analysis tools for threat detection and security monitoring
(referred to as security analytics):
Figure 4.15: Security analytics illustration
Conclusion
We have observed that historically enterprises (businesses) have taken the
path of implementing best-fit solutions (that were appropriate for their
need). Examples of such solutions are mentioned in the section, The need
for CSMA. The limiting factor was non-interoperability among
cybersecurity tools which impeded the swift decision-making needed for
effective incident management. Inadequacy interoperability and
cohesiveness of cybersecurity tools/platforms results in increased overhead
in operations,
increased risk due to incomplete mapping of attack surface, incomplete
contextual information leading to ineffective decision-making and increased
incident’ MTTR and incident response.
As discussed in this chapter, CSMA leads to enhancement of visibility,
reduction in complexity, sharing of intelligence, enhanced automation,
consolidation of security products, and usage of security analytics across
domains in a complex and distributed cybersecurity ecosystem. This results
in driving a larger Return on Investment from the existing investment
(which is the most difficult variable to draw out in cybersecurity),
prioritizes risk based on business impact, and most importantly enables
effective incident management and response through intelligence sharing
(across domains).
As a concluding remark, we should say: There is all the benefit in
cybersecurity meshing.
In the subsequent chapter, we shall further examine the key components of
CSMA, discuss the outcome of the adoption of CSMA, and conduct a sneak
preview of CSMA products/solutions.
Points to remember
Key terms
Introduction
In the previous chapter, we discussed the concept of CSMA, its need for
enterprises (businesses), and its benefits in detail. A security mesh
architecture is a philosophy and not necessarily a single end-to-end security
solution. Some fundamental aspects of CSMA, such as its key components
and the merits of its adoptions by enterprises (businesses) will be discussed
in this chapter.
Structure
In this chapter, we will cover the following topics:
A re-look at CSMA
Key components of CSMA
The unified architecture of CSMA
Major products/solutions of CSMA
Objectives
This chapter will discuss various layers (referred to as key components)
that make up a CSMA, the interaction amongst these layers, and how this
architecture contributes to a progressive enhancement of the Cybersecurity
maturity posture of an enterprise (business). We shall further discuss the
outcome of the adoption of the unified architecture as propagated by CSMA
and have a look at CSMA products/solutions across various categories.
A re-look at CSMA
Layers of vulnerabilities and gaps due to the absence of interoperability of
security tools/solutions are forcing security models to be redefined. Added
to this equation is the ever-growing complexity of cloud (multi and hybrid)
environments that is changing the threat landscape. Refer to section, The
current situation of the cybersecurity ecosystem of Chapter 4, The
Need for Cybersecurity Mesh Architecture, wherein most enterprises
(businesses) use, on average, 45+ cybersecurity tools/solutions, which leads
to unmanageable complications and maintenance overheads to manage each
tool/solution.
CSMA addresses these issues by using modular technologies (also scalable
and flexible) along with strong standards and policies. This creates an
ecosystem of security tools/solutions that integrate across all its components
and provide maximum security.
Another way of looking at this is the fact that each computing environment,
such as Infrastructure as a Service (IaaS), Software as a Service (SaaS),
virtual machines, endpoints, etc., is generally siloed (which means security
controls are specific to the environment). CSMA enables a security posture
through the integration of tools/solutions.
In effect, CSMA aids enterprises (businesses) to move towards an
integrated ecosystem from a siloed/standalone philosophy. It provides a
framework that revolves around analytics, controls, and threat hunting and
follows Zero Trust objectives.
The benefits of implementing CSMA are depicted in the following
illustration:
Figure 5.1: Key benefits of CSMA
Working of CSMA
A vital principle of CSMA is to combine a set of computing tools/resources
using a unified application programming interface (API). This allows the
pool of available resources to be requested automatically as required for
particular applications/workloads.
In CSMA, processes take an API-first approach, wherein programmers
write software code after conceptualizing how an API will behave and
address specific business requirements. CSMA incorporates regimented
standards and security processes in the initial connections not only among
applications but also between hardware and software.
When this happens, hardware becomes a secondary issue, and the
connections as the process drivers become more secure and take
precedence. Also, due to the usage of unified API, the new connections
combine AI, M, and automation to make the enterprise (business) security
scalable and less complex.
Integrated data
Distributed identity fabric
Comprehensive security intelligence
Automated operations
Centralized operations
Consolidated dashboards
Integrated data
This is the foundational component of CSMA. Integrating data from
disparate sources across security systems is vital. There are distinct
advantages to doing so. First, this enables security solutions/tools/products
to talk to each other, which enhances each component’s effectiveness and
flexibility. Second, data analysis and data mining (which enhances
intelligence) also become effective and meaningful.
For example, a security alert may be received from an IAM tool indicating
an inappropriate access attempt or an account being created incorrectly.
This could seem like an important notification, but there could be a
weakness in the IAM tool, which can only be known with the assistance of
other security tools/systems.
In the case of CSMA, a cloud monitoring tool may be able to correlate and
associate unusual access to a cloud computing resource with a privileged
account. This may lead to questioning the IAM tool for more information.
Therefore, the data integration component in CSMA is very powerful. It is
not just data aggregation; it enables siloed security systems to work much
more effectively through multi-event complex correlations.
Automated operations
The previous components focused on integration and analysis. This one
works towards streamlining management of 2Ps viz, Policy and Playbook.
This is, therefore, the management component of CSMA and enables the
setting up of policies. These policies govern how and when alerts are
triggered and how data is processed for analytics. CSMA deals with
centralization and integration and enables the setting up of policies for any
component connected to the security mesh.
Whether it is SIEM logs, zero trust policies, or IAM controls, all can be
configured from a central place. Similarly, event playbooks can also be
integrated into security systems, lending a comprehensive security incident
response.
Centralized operations
This component of CSMA covers dashboards and operational controls
under one roof. A CSMA dashboard takes time to build and includes tools
for investigating and reporting events and visualization tools.
Visualization tools can especially be utilized to generate a comprehensive
risk score of the complete security stack in a mesh (this is only possible
because of holistic security data aggregation).
Consolidated dashboards
The last component of CSMA deals with the overall security posture of an
enterprise (business). Traditionally, in a standalone/distributed/siloed
environment, security posture would be examined through specific
dashboards, for example, an EDR dashboard for endpoints or a Cloud
Security Posture Management (CSPM) dashboard for Cloud.
With CSMA, teams can have a unified (and consolidated) view of the
security posture of all assets (on-premise/cloud) centered around identities
in the form of dashboards. This enables swift and agile security incident
response.
In summary, in CSMA, standalone/distributed/siloed solutions work
together in a complementary (interconnected) manner, improving the
overall security posture of the enterprise (business).
Extensive
A regimented CSMA needs a spate of integrated analysis tools to aggregate
security data across the cybersecurity ecosystem. Please note that CSMA
needs sufficient data to work and abstract the operations of the network,
endpoints, and cloud security solution assuredly. enterprises (businesses)
need a wide range of superior-quality security systems to support the
implementation of CSMA.
For example, solutions such as zero trust access, network security, cloud
security, etc., should have the required communication capabilities that
would enable them to integrate into the larger cybersecurity ecosystem.
Integrated
CSMA includes an array of cohesive analysis and response mechanisms
that help connect various components of a distributed IT/cybersecurity
ecosystem. As mentioned earlier in this chapter (Refer to the section
Comprehensive security intelligence), solutions such as SIEM, SOAR,
EDR, etc., come under this roof. Moreover, each solution integrates with
the cybersecurity ecosystem and provides the much-required threat
intelligence for swift and efficient incidents.
CSMA takes time to build and progressively mature over time. It is
intricate, which is evident from the fact that various features and services go
into it, and is very flexible (scalable). Each part of the cybersecurity
ecosystem can be tweaked over time to meet the needs of the enterprise
(business).
The key to managing this goal is the integration of cybersecurity solutions.
The underlying unified security architecture is thus able to reduce the
complexity in the management of cybersecurity solutions/tools while
enhancing threat intelligence.
Figure 5.5 lists the CSMA solutions that belong to the Email category:
Figure 5.6 lists the CSMA solutions that belong to the Identity category:
Figure 5.6: CSMA solutions belonging to Identity category
Figure 5.7 lists the CSMA solutions that belong to the Data category:
Figure 5.7: CSMA solutions belonging to Data category
Data Classification
Enterprise Digital Rights Management (EDRM)
Data Loss Protection (DLP)
Figure 5.8 lists the CSMA solutions that belong to the Applications
category:
Figure 5.8: CSMA solutions belonging to Applications category
Figure 5.9 lists the CSMA solutions that belong to the Devices/Servers
category:
Figure 5.10 lists the CSMA solutions that belong to the Cloud category:
Figure 5.10: CSMA solutions belonging to Cloud category
Conclusion
Through this chapter, we understood that implementation of CSMA results
in enhanced agility, flexibility, scalability, and cybersecurity posture.
CSMA takes an enterprise’ (business’) cybersecurity infrastructure to an
elevated level owing to the integration of various cybersecurity services. All
communications coming in and going out of the network are protected,
making it safer. A message to all enterprises (businesses) is to be future-
ready. Choose cybersecurity solutions that facilitate integration. Use plug-in
APIs to aid customization and interoperability (further aiding data analytics
and threat intelligence).
Bridge security gaps due to weaknesses/vulnerabilities, if any, in
cybersecurity solutions using current and enhanced CSMA security
standards.
Implement all key components of CSMA by laying emphasis on all key
components, such as data integration, identity fabric, policy management,
security analytics, threat intelligence, and integrated dashboards. A
combination of all components (aka overarching solution), provides an end-
to-end and a holistic cybersecurity ecosystem. In the next chapter, we shall
further into the unified architecture of CSMA, discuss the importance of
integration, comprehensiveness, and automation in CSMA, and examine the
key factors to consider while adopting CSMA.
Points to remember
Key terms
Introduction
In the previous chapter, we discussed the fundamental components of
CSMA, which enable it to deliver a strong framework for security
infrastructure. While the modern digital world witnesses advanced threats
that are constantly evolving, various state-of-the-art edge security tools rise
to the occasion to address this challenge (but in a highly distributed
environment). CSMA takes this response to the next level by integrating
these resources.
In this chapter, we will discuss what to expect when adopting a CSMA and
how enterprises (businesses) can effectively prepare for the future.
Structure
In this chapter, we will cover the following topics:
Performance
Cybersecurity landscape of today
Key aspects for CSMA adoption
Getting started with CSMA
Key factors to consider while adopting CSMA
Objectives
We discussed the key foundations of CSMA in Chapter 4, The Need for
Cybersecurity Mesh Architecture. For new enterprises (businesses), these
key foundations present a blueprint for designing and building the
cybersecurity architecture. However, this is challenging for many
enterprises (businesses) due to the existing legacy of the IT ecosystem
comprising various security solutions.
No one vendor can provide all the required building blocks, comprehensive
standards are in the works, and cybersecurity products/services do not
generally interoperate. The objective of this chapter is to walk through the
steps enterprises (businesses) can undertake to adopt a comprehensive
CSMA.
Performance
Let us examine the treatment of cybersecurity challenges thus far.
Standalone/siloed cybersecurity solutions have a tradition in dealing with
these challenges. Enterprises (businesses) have thrown standalone solutions
for endpoint security, cloud security, network security, email security, etc.,
in the fold and try to deal with the challenges.
This is unfortunately not workable. Modern-day IT infrastructure
operational needs are complex. For example, IoT, hybrid clouds, an
employee using more than one device, and offices that are geographically
spread and separated are increasingly complex (resources are widely
distributed).
There is no way this ecosystem will change because this is lending
effectiveness and competitiveness to enterprises (businesses).
Adoption of cloud
Over the last few years, enterprises (businesses) have been working to
move their workloads to the cloud, predominantly to utilize the benefits of
cloud technologies. However, one common concern among everyone is the
security concerns surrounding cloud adoption. Two common concerns in
this light are inadequate visibility and the absence of comprehensive
security controls.
We have seen how complex an IT ecosystem is. The adoption of the cloud
adds a layer to this complexity. What increases the security risk are the
following aspects: new entry points for attackers, new tools, and
unfamiliarity of staff (administrative/engineering) with new technologies.
If the lack of visibility and absence of comprehensive controls is added to
this mix, the challenge is further compounded. If this is not enough, many
enterprises (businesses) work in a hybrid/multi-cloud mode where
technologies differ, further adding to the complexity.
CSMA is a method of addressing security challenges in the cloud by
aggregating security data from a wide variety of security resources and then
centralizing security controls to ensure ease of use.
Security tools need integration and aggregation in the future, and CSMA is
a flexible and scalable method to commence nurturing that kind of security
ecosystem.
Integration
Amongst many vital aspects of a strong cybersecurity ecosystem are the
visibility of data and infrastructure. This helps combine security resources
centrally, thus aiding in preventing hackers from operating in a stealth mode
and exploiting a weak spot.
CSMA works to create connections among security tools/solutions that
were otherwise standalone/siloed and enables aggregation of security data
for easier analysis and observability.
A holistic data collection capability also allows the system to learn from
past cyberattacks and progressively improve the cybersecurity posture.
CSMA enables the integration of security data sources. This supports
security and operation teams in swiftly and efficiently collecting and
analyzing information after an incident.
Similarly, visibility across the cybersecurity ecosystem in an integrated
manner, with near- almost real-time updates, enhances the speed of
detection and response.
Therefore, enterprises (businesses) need to address the absence of
integrated visibility and lack of central control to maintain and secure a
multi-cloud environment.
Comprehensiveness
We just referred to visibility as one of the vital aspects of a strong
cybersecurity ecosystem. However, visibility does not have meaning if you
cannot do much with it. Equally vital is for the cybersecurity ecosystem to
be flexible (scalable) and efficient through strong control capabilities.
CSMA works towards centralizing security controls (as much as possible)
by aggregating data and creating comprehensive dashboards (central
consoles for efficient control). The benefits of central access are efficient
reporting, swift investigation, and real-time alerting.
CSMA does not only lead to the integration of security data but also lends a
centralization theme to control the IT ecosystem. Orchestration and policy
management are centralized in a CSMA.
Policies are not required to be set on a one-on-one basis for a wide variety
of security tools/solutions because, in a CSMA environment, tool/solution
functionality is integrated.
Automation
When cybersecurity tools/solutions are integrated into a control system
centrally, automation of security tasks becomes effective and powerful. It is
not only cyber attackers who use automation to swiftly move laterally
through systems to carry out complex attacks. Automation is equally useful
for defense tools in the present circumstances (and will be in the future as
well).
CSMA enables a variety of tasks to be automated with great flexibility.
Device configuration tasks can be set up centrally, so they can be
notifications/triggers freeing up the time of security and operation teams.
Overall, CSMA is built to weave automation of tasks through cybersecurity
tool/solution integration (by leveraging AI and ML) that enables dynamic
policies and configurations.
Getting started with CSMA
The key components of CSMA, as discussed in detail in Chapter 4, The
Need for Cybersecurity Mesh Architecture, present a blueprint roadmap for
designing, building, and implementing CSMA.
This is true for a greenfield setup, but for many enterprises (businesses), the
start will be from a legacy IT ecosystem—a complex ecosystem with many
cybersecurity tools/solutions already in place.
Many challenges need to be overcome for a successful adoption of CSMA.
For example:
A single vendor does not have all the building blocks required for
CSMA
Standards required for CSMA are still in the works
Tools/solutions do not yet provide the required interoperability
Despite this, the following steps shown in Figure 6.3 can help enterprises
(businesses) advance toward an effective implementation of CSMA
implementation:
Data integration:
This is a powerful component in CSMA.
Evaluate tools/solutions that support data aggregation enabling
effective working of siloed security systems with the ability to
perform multi-event correlations.
Distributed identity fabric:
This is the most critical component.
Seek tools/solutions that assist in the central administration of
identities and can strictly enforce access policies (sophisticated)
across the IT ecosystem.
Comprehensive threat intelligence (and analytics):
Tools/solutions such as SIEM, UEBA, SOAR, XDR, etc., that can
integrate well with the core cybersecurity and identity solutions.
Provide risk scoring that is dynamic and entity-based.
Automated and centralized operations:
Look for tools/solutions that can streamline the management of
2Ps, such as policy and playbook.
Have the capabilities aligned with NIST, CIS, and ISO (globally
recognized and established security standards).
Consolidated dashboards:
Works towards an ideal dashboard that will provide clear
visualizations of risk scoring and alerts on a real-time basis and
comprehensive insights.
Decide whether you are seeking multiple views (for different IT
security and stakeholder roles), as well as advanced features such
as customizable widgets and reports.
OAuth 2.0
OpenID Connect
System for Cross-domain Identity Management (SCIM)
Open Policy Agent (OPA)
Seek consolidation
Post-evaluation of suitable vendor(s) and cybersecurity tools/solutions,
enterprises (businesses) should look to simplify their cybersecurity stack
and licensing regime. This can be achieved through vendor and
tools/solutions consolidation.
Many enterprises (businesses) in today’s world have already commenced
the journey of cybersecurity vendor consolidation.
This level of consolidation should be at an appropriate level. If an enterprise
(business) is seeking one identity provider to limit its identity fabric, it may
not be reasonable to effectively manage all the use cases.
There are various internal employee groups, external contractors,
customers, partners, etc. All these entities have specific identity use cases
that will be difficult to manage.
It is advisable to have a CSMA vision with an underlying cybersecurity
roadmap of tools/solutions/services. The objective should be to have an
integrated ecosystem of tools and standards that does not lead to elevating
your technical debt in the long run.
Vulnerability:
IT ecosystems are vulnerable to phishing and ransomware attacks,
both of which have been on a steady rise year-on-year.
If this is not difficult enough, there exists the danger of a zero-day
attack (explained in the previous chapters, this is an attack by a
method that was unknown previously).
CSMA enables an enterprise (business) to reduce these
vulnerabilities significantly and prepares its cybersecurity
infrastructure for such attacks.
Cost:
Global ransomware damage costs will reach $20 billion by 2021
(57x more than it was in 2015), and the cost of cybercrime attacks
is on the rise at about 15% per year over the next five years1.
There is a huge cost of digital transformation as well for
enterprises (businesses) whose infrastructure/architecture has to
undergo redesign.
It is reasonable to state that the reduction in attacks (costly) and
downtime due to leveraging CSMA far outweighs any initial cost.
Migration:
Many clients/consumers have shifted to cloud computing owing
to their benefits, which has led to an increase in data breaches.
CSMA enables migration to cloud computing by providing
flexible and scalable protection.
The above-mentioned factors showcase the need for CSMA. Figure 6.5 lists
the add-on factors for considering CSMA:
Figure 6.5: Add-on factors for considering CSMA
Let us have a look at the add-on factors that deliver more attractiveness to
adopting CSMA:
Implementation ease:
Accelerated growth of digitalization over the years has led to
rendering traditional security models top-heavy and difficult to
manage.
CSMA is distinctively tailor-made to enable simplicity and
efficiency in designing, deployment, and maintenance.
Practicality:
Old-style cybersecurity policies, methods, and techniques are
complicated due to cloud computing technology, distributed data,
and uncontrolled devices.
The CSMA strategy presents a practical way to deal with
aspects/components that do not lie inside the traditional network
perimeter of an enterprise (business).
Agility:
This has been previously discussed. The very nature of the CSMA
approach renders an enterprise (business) to respond to security
and expansion in a more agile manner.
The benefits of modularity, scalability, and collaboration are as
follows:
Nodes can be modified
(added/removed) relatively easy
A central control point can be used
to monitor and control new
locations
Conclusion
CSMA is a modern approach (conceptual) to build a security architecture to
address the challenges of a distributed enterprise (business) and to say the
least, the continually evolving (changing) threat landscape/attack surface.
Various benefits of adopting CSMA in the wake of embracing digital
transformation and the evolving sophistication of cyber threats are
deployment of security controls where needed the most, establishment of
granular access controls, prioritization of identity-centric security,
collaboration amongst security tools/solutions/services, provision of
centralized management, enablement of end-to-end automation, increased
visibility and control, enhancement of scalability and flexibility,
establishment of a strong framework to strengthen the overall cybersecurity
posture and enhancement of business resilience.
Conclusively, the adoption of CSMA is an involved process and worth the
investment by an enterprise (business). It delivers benefits swiftly in this
progressive journey wherein every step taken leads to improvement in
cybersecurity posture, simplification of operations, and positioning an
enterprise (business) for a brighter future.
In the next chapter, we shall re-examine what necessitates the adoption of
CSMA, the benefits of leveraging CSMA, discuss the characteristics of a
CSMA strategy, delve into a few target use cases, and learn about the
pitfalls of not leveraging CSMA.
Points to remember
Key terms
1. https://cybersecurityventures.com/cybercrime-damages-6-trillion-by-
2021/
Introduction
Primarily in Chapter 1, Cybersecurity: A Dynamic Changing Paradigm, we
had a look at the chronology of the evolution of cybersecurity, and some
major trends that had a noteworthy impact. Chapter 2, Cybersecurity:
Understanding Today’s Security Challenges, dealt with understanding
distributed systems (working and challenges) and overall cybersecurity
challenges in the digital age. Whereas, Chapter 3, Emerging Cybersecurity
Trends, covered the emerging cybersecurity trends and the importance of
cyber resilience.
In Chapter 4, The Need for Cybersecurity Mesh Architecture, we first inked
the need for CSMA and the benefits of its adoption. Chapter 5,
Fundamental Components of Cybersecurity Mesh Architecture, covered the
fundamental components of CSMA delivering a framework for security
infrastructure. In Chapter 6, How to Effectively Adopt Cybersecurity Mesh
Architecture, we discussed what enterprises (businesses) can expect when
adopting the architecture and how they can effectively prepare for the
future.
In this chapter, we will re-examine the need for CSMA, the benefits of
adopting the same, and the pitfalls of not leveraging it.
Structure
In this chapter, we will cover the following topics:
Objectives
We are living in a world that is witnessing an ever-increasing digital
acceleration. This is leading to a swift adoption of new technologies across
the IT ecosystem (including cloud migration). It is not surprising to see
enterprises (businesses) moving first (say even to multi-cloud) and later
asking themselves how to manage and secure these environments.
We also have many organizations with standalone/silos
tools/solutions/services. This leaves their cybersecurity teams to manage the
mesh and complexities of the resulting makeshift arrangements.
These standalone/siloed environments, related complexities, and visible
gaps provide opportunities for cyber attackers to exploit. This is further
exacerbated by resource and skill gaps in cybersecurity (Refer to section
Trend 14: Widening IT skills gap in Chapter 3, Emerging Cybersecurity
Trends).
It is time for enterprises (businesses) to transform their present approaches
to cybersecurity that have a standalone/siloed approach. For this
transformation, they need to adopt CSMA as the baseline (building block).
This would enable them to integrate their distributed ecosystem and create
consistency, interconnectivity, collaboration, and automation across the
various tools/products/services to drive their digital acceleration initiatives.
In the subsequent sections of this chapter, we shall re-look at why CSMA is
necessary to be adopted by enterprises (businesses), cover its benefits,
discuss what a CSMA strategy should look like, take a deeper look at
CSMA target use cases, and examine the downsides of not leveraging
CSMA.
Not only the cybersecurity teams but also the business teams are enabled to
communicate technical subjects with their teams.
An IP address
A hostname
An interface
Username (in case of insider threat)
This exemplifies the need for CSMA. The limiting factor with previous
ecosystems/architectures was the non-interoperability of cybersecurity
tools. This inadequacy hampered swift decision-making for effective
incident management.
In summary, CSMA brings about interoperability and cohesiveness of
cybersecurity tools/platforms, resulting in effective decision-making owing
to enhanced visibility of contextual information and a reduction in the
MTTR of cybersecurity incidents and responses.
Efficient compliance
Leveraging CSMA leads to a reduction in compliance-related obligations
and risks. This is due to the simplification of compliance monitoring, where
the assessment process is centralized through maximization automation.
In addition, CSMA assists security teams in comparing their enterprises
(businesses) standards to industry standards, viz., the National Institute of
Standards and Technology (NIST).
Enhanced savings
The cost of ransomware attacks and cybercrime attacks is increasing year
on year. Digital transformation incurs its own cost, too, especially if an
enterprise’s (business) infrastructure/architecture has to be redesigned.
However, the reduction in costly attacks and business downtime realized by
leveraging CSMA far outweighs any initial cost.
CSMA saves precious time and resources for cybersecurity teams by
eliminating the need for aggregating data manually and the use of multiple
query languages.
Integration
Comprehensiveness
Automation
Security operations
CSMA provides cybersecurity teams with an integrated (comprehensive)
view of the security stack, thereby meaningfully enhancing security
operations.
Also, this enables the cybersecurity teams to swiftly and conveniently
obtain deep insights, recognize potential threats, and undertake proactive
steps to mitigate risks.
Vulnerability management
There has been a multi-fold increase in phishing incidents over the years,
and ransomware attacks occur every other hour. Current IT systems are,
therefore, very vulnerable. Not only is it the existing vulnerabilities, but
also there is the threat of a zero-day attack, an attack by a method
previously unknown.
CSMA enables the identification and analysis of vulnerabilities across the
security stack thereby lending support to vulnerability management.
It helps cybersecurity teams prioritize and address vulnerabilities basis their
business impact (contextual) and associated risk levels.
CSMA approach also prepares an enterprise’s (businesses’) security
infrastructure for zero-day attacks.
Compliance management
CSMA provides a centralized platform for compliance assessment across
various cybersecurity tools/solutions/services thereby simplifying
monitoring of compliance.
This eventually enables effective tracking of compliance status,
identification of gaps, and streamlining the reporting process.
API Graph
It will be essential for a CSMA vendor/player to establish an interconnected
(dynamic) graph of the APIs exposed by various security tools (covering
cloud and on-premises-based solutions).
This holistic graph will provide a comprehensive view of the security stack
and will assist in understanding how the data exposed by each tool relates to
others.
Restricted decision-making
Let us consider the following real-life situation related to restricted
decision-making:
Problem statement: Siloed ecosystems depend on data sets from their
tools (individual and not integrated), thus decisions are arrived at
without business context.
Enterprises (businesses) have assets that run into
hundreds of thousands with millions of vulnerabilities.
In this situation, it is not possible to resolve all risks. To
manage remediation, enterprises (businesses) either
depend on vendor-provided risk scores or any other
form of aggregated score.
Challenge: Using risk scores that lack business (and network) context
leads to ineffective risk prioritization and incorrect business impact.
Without including context across the business and network, pursuing a
non-contextually relevant risk score (lacking business/asset
intelligence) results in ineffective risk prioritization, risk reduction,
and uncertain business impact.
The absence of business/network context has negative
impacts on different teams:
Vulnerability management teams make incorrect decisions related
to the priority of assets and patches
Security operations teams decide basis the context of the
technology stack from SOC rather than the business
Networking teams decide based on routing and ambiguous IP
addresses
Solution: Leverage CSMA to enable domain intelligence (cross-
domain). This aids the convergence of siloed knowledge and data
leading to augmenting the cybersecurity team’s decision-making
ability.
Benefits: A meshed ecosystem covering network and security services
helps vulnerability management teams swiftly identify the vulnerable
assets that are a part of crown jewels applications. This kind of
analysis will otherwise require domain expertise across networking,
vulnerability analysis, and penetration testing which is not easy.
By leveraging CSMA, the data aggregation, and analysis is automated
leading to abstracting the result into a visual and interactive format that
simplifies the complex.
The real benefit of adopting CSMA is to:
Conclusion
CSMA works towards addressing the challenges presented by the
distributed enterprise (business) and the continuously changing threat
landscape/attack surface.
CSMA’s adoption leads to deployment of security controls where they are
needed the most, establishment of granular access controls, enhanced
facilitation among security tools/solutions/services, increased visibility and
control (centralized) across the ecosystem, increased agility due to
reduction in deployment times and acceleration of digital transformation,
increased resiliency by way of understanding interdependencies (context
cross-domain) leading to better uptime and recovery, increased efficiency
by allocating more experienced staff to higher-value activities and reduced
risk by implementing business-centric risk reduction programs.
Overall, CSMA presents a robust framework that enables the strengthening
of an enterprise (business) cybersecurity and protecting their valuable
assets.
In the next chapter, we shall compare CSMA with traditional defense-in-
depth approach, re-visit the salient points and goals for CSMA, present a
list a systematic approach to implementing CSMA, list some of the key
performance indicators) for assessing the effectiveness of the
implementation of CSMA and introduce the ten commandments of CSMA.
Points to remember
CSMA is a baseline foundation that enables disparate security
tools/solutions/services to work in an integrated manner to create a
dynamic security ecosystem.
As enterprises (businesses) embrace digital technologies, CSMA lends
a scalable and flexible base that enables bolt-on security for assets in
hybrid and multi-cloud environments.
Adoption of CSMA provides major benefits to enterprises
(businesses). It leads to:
Reduction (significant) in the manual analysis of security data
(freeing up cybersecurity teams for more value-added activities)
Consolidation of security analytics (predictive)
Consolidation of cybersecurity posture management
Enhanced security incident response
Effective business risk reduction
Key terms
Introduction
We have covered various topics in the first few chapters ranging from the
chronology of the evolution of cybersecurity, understanding the distributed
systems (working and challenges), cybersecurity challenges in the digital
age, the emerging cybersecurity trends, and the importance of cyber
resilience.
In the subsequent chapters, we took a first-hand view of the need for
CSMA, and the benefits of its adoption, looked into the fundamental
components of CSMA, and further discussed what enterprises (businesses)
can expect when adopting the architecture and how they can effectively
prepare for the future.
In the preceding chapter, we understood the need for CSMA, its benefits,
and the pitfalls of not adopting it.
In this chapter, we will concentrate on the best practices that will help
enterprises (businesses) to traverse the path to incorporating CSMA. It
brings about an architectural and philosophical change that is an asset to
enterprises (businesses) for all practical purposes.
Structure
In this chapter, we will cover the following topics:
Objectives
In chapters 5-7, we learned that CSMA enables enterprises (businesses)
with the strategy for proactive cyber risk mitigation. The cornerstones of
this approach are aspects of interoperability and collaboration among
cybersecurity teams and tools/solutions. This further nurtured an
interconnected and context-aware cybersecurity ecosystem, which reduces
business risk and enhances operational efficiency by disrupting traditional
cybersecurity paradigms.
We will further discuss in detail how CSMA takes a vendor-agnostic
approach and enables enterprises (businesses) to utilize the strengths of
multiple vendors instead of living with the constraints of a single vendor’s
ecosystem.
This creates flexible (scalable) and adaptable enterprises (businesses). They
can select the most appropriate security tools/solutions/products and
technologies for their specific needs and stay ahead of emerging threats.
In this chapter, we shall revisit the goals of CSMA, seek a step-by-step
approach to implementing it, and list the KPIs for assessing the
effectiveness of the implementation.
Let us now examine (refer to Table 8.1) the major differences between
CSMA and the traditional defense-in-depth approach:
In this section, let us re-examine the salient points and goals of CSMA:
Problem statement:
In today’s cybersecurity field, enterprises (businesses) rely on
multiple vendors for security tools/solutions.
A unique set of expertise and capabilities is offered by each
vendor, and enterprises (businesses) generally select different
products from different vendors to address their specific security
requirements.
Challenge:
Such an approach leads to challenges such as vendor lock-in and
interoperability among security tools/solutions.
Solution:
CSMA, by default, builds in a vendor-agnostic approach that aids
in designing a resilient and scalable (flexible) security
architecture.
Due to this approach, enterprises (businesses) can utilize the
strengths of multiple vendors and avoid the limitations of the
ecosystem of a single vendor.
Benefits:
Enterprises (businesses) can choose the most befitting security
tools/solutions/products basis specific needs instead of restricting
themselves to a specific vendor’s offerings.
Vendor-agnostic approach supports and provides a fillip to
integration and collaboration among vendors.
Enterprises (businesses) can utilize the expertise and collective
intelligence of the cybersecurity ecosystem, due to security
tools/solutions/products from different vendors that can
seamlessly communicate and share information.
Collaboration leads to the enhancement of cyber defense
capabilities and enables enterprises (businesses) to effectively
respond to cyber threats.
Vendor-agnostic approach also provides adaptability and
flexibility.
enterprises (businesses) can incorporate new and emerging
solutions and technology into their cybersecurity ecosystems, as
they no longer are limited by a single vendor’s roadmap.
Overall, this approach enables enterprises (businesses) to steer
ahead of evolving cyber threats by leveraging the latest
innovations in cybersecurity.
1. Assess:
1. Assessing the present state and requirements of the enterprises’
(businesses’) technology environment and cybersecurity posture
2. Identifying the gaps and opportunities for improvement (OFI)
3. The key steps are:
1. Conducting a security audit, risk assessment, and maturity
assessment
2. Defining the security goals and objectives
2. Design:
1. Designing the CSMA framework
2. Selecting the cybersecurity tools/solutions and vendors to be
included in the CSMA ecosystem
3. The key steps are:
1. Defining the cybersecurity requirements and specifications
2. Evaluating and comparing the security tools/solutions and
vendors
3. Creating the cybersecurity roadmap
3. Deploy:
1. Deploying and configuring the cybersecurity tools/solutions
2. Integrating them with the CSMA key components (Refer to
Chapter 5, section The key components of CSMA and Chapter 6,
section The key components of CSMA for details)
3. The key steps are:
1. Testing the cybersecurity tools/solutions
2. Establishing the security policies and rules
3. Enabling the security data and communication channels
4. Operate:
1. Operating and monitoring the cybersecurity tools/solutions and
the CSMA ecosystem (ensure proper and effective functioning)
2. The key steps are:
1. Managing and maintaining the cybersecurity tools/solutions
2. Collecting and analyzing the cybersecurity data
3. Responding to security incidents and alerts
5. Optimize:
1. Optimizing and improving the cybersecurity tools/solutions and
the CSMA ecosystem (ensuring alignment and updation with the
changing industry trends).
2. The key steps are:
1. Reviewing and evaluating the performance and outcomes
2. Identifying and implementing the cybersecurity best
practices and enhancements
3. Planning and executing the cybersecurity changes and
upgrades
Way 1: Composability
Cybersecurity controls and functions are modular and can be
deployed per the needs/preferences of each asset/user
Not constrained by a single vendor/platform
Way 2: Interoperability
Cybersecurity tools/solutions can communicate and collaborate
via key components such as data integration, comprehensive
threat intelligence (and analytics), distributed identity fabric,
automated and centralized operations, and consolidated
dashboards (also consolidated policy, posture management, and
modular security controls).
Way 3: Collaboration
Cybersecurity tools/solutions can leverage and share the data and
capabilities of each other
Provide a more consistent and comprehensive cybersecurity
posture
Overall, CSMA:
The above list is only indicative and should be considered as a starter. The
KPIs chosen by an enterprise (business) to be tracked will depend on its
environment (that is unique to that enterprise) and its CSMA ecosystem.
Refer to Figure 8.5, that lists the next five commandments of CSMA:
Figure 8.5: CSMA 6-10 commandments
Leverage – AI and ML
Leverage recent developments in AI and ML for security-related
applications
Vet AI and ML tool providers and ensure they provide holistic
and effective tools/solutions/products
Automate – security stack
Streamline cybersecurity operations through automation
(integrated cybersecurity ecosystem). Automate as many tasks as
possible such as device updates, tasks related to analysis (saves
the crucial time of security staff to spend on evaluation tasks).
Automate threat response and threat analysis to generate swift
security intelligence.
Define security policies and design playbooks.
Identify – skill gaps
It is increasingly hard to find cybersecurity talent.
Different skills are required to manage modern cybersecurity
tools/solutions such as for endpoints, edge devices, cloud assets
and applications, and the skill gap is continuously widening.
Use of CSMA leads to simplification of cybersecurity processes.
It also enables the narrowing of skill deficiencies by assigning
new security tasks to more familiar zones.
External raining or outsourcing skills can be utilized to manage
the more serious skill gaps.
Partner – with ecosystem players
There is no Enterprise (Business) that has all the expertise
required to maximize its cybersecurity posture.
It is vital to contact industry experts regarding security concerns,
potential attack surface vulnerabilities, etc.
Leverage the know-how of the industry experts who are
specialized professionals (better equipped than an average
security team in an enterprise (business).
Improve continuously
Every cyberattack presents an opportunity to:
Evaluate the current policies and
playbooks
Identify areas of improvement for
the cybersecurity systems
Keep pace with the latest industry practices to ensure that the
threat readiness is at par with current potential cyber threats.
Conduct assessments of the security architecture on a regular
basis.
Solution
Carrying out a thorough assessment of the enterprises’ (businesses’)
cybersecurity infrastructure
Finding redundancies
Prioritizing integration efforts
Designing a roadmap
Collaborating with vendors
Carrying out holistic user awareness training and education to
cybersecurity teams on CSMA, its key components, and benefits
(including the best practices)
Conclusion
Enterprises (businesses) need to adopt CSMA and build a solid baseline for
safeguarding their digital assets. This becomes increasingly important in an
ever-changing cybersecurity threat landscape.
We have seen that the implementation of CSMA presents its challenges.
These can be managed via thorough assessments, vendor collaboration, and
comprehensive user training (education).
In the last chapter, we shall examine use cases in three distinct
environments where CSMA works (viz., work from home, cloud, and
operational technology (OT)) and have a sneak preview of the CSMA
market overview, its growth factors, dynamics, and opportunities for
growth.
Points to remember
Key terms
Introduction
In the previous chapters, we concentrated on the benefits of adopting
CSMA and explored its best practices. We conducted research on many
aspects of CSMA viz, its necessity, its target use cases, downsides of not
leveraging CSMA, characteristics of a CSMA strategy, its salient points and
goals, key performance indicators (KPIs), and eventually its ten
commandments.
In this chapter, we shall examine some distinct use cases where CSMA
works. We will take a specific example of the healthcare industry and
examine how healthcare systems can leverage CSMA (potentially adopted).
Lastly, we will understand another important aspect of the global market
overview and dynamics of CSMA.
Structure
In this chapter, we will cover the following topics:
Work-from-home environment
Cloud security environment
OT security environment
CSMA in the healthcare system
CSMA
Objectives
We have seen that CSMA is a holistic approach to safeguarding information
assets and infrastructure. Consequently, CSA works in varied situations,
and this chapter aims to examine different use cases, viz., work-from-home
environments, cloud environments, and operational technologies (OT)
environments. These environments present variations/distinct security
challenges, and CSMA can address these by significantly contributing to
maturing security in each of these scenarios.
Work-from-home environment
COVID-19 brought about a transformational change wherein employees
started to work from home on devices that enterprises (businesses) had
no/little control over. We say transformational for the reason that these
enterprises (businesses) were pushed into a rare situation that required
fundamentally new ways of working.
CSMA approach for security work-from-home environment entails:
OT security environment
Problem statement
At the core of OT is a collection of industrial control systems (ICS) which
can be a combination of sensors/monitors/other technologies used in
industrial settings. These are markedly different compared to a normal
back-office application and exhibit specific characteristics. Especially OT
generates large amounts of data continuously.
Perceived risk
Components in an ICS have implicit trust wherein if a component is
accessible, it is assumed that it is a part of the same ICS. An ICS is
explicitly required to be isolated from other systems. Now, if an ICS device
is accessible over the Internet, it no longer has the security benefits of
isolation.
Similar to the security challenges that are unique to remote work and cloud
environments, OT environments also have a distinct set of challenges that
need to be addressed.
Solution
CSMA assists with OT security best practices including asset identification
and classification. Enterprises (businesses) should prioritize the value of
different types of OT assets (some are likely to be more valuable as
compared to others). The top priority is to know what is the most important
and secure them. Equally vital is the ability to analyze traffic together with
threats and vulnerabilities. We have seen earlier in use cases sections that
even devices that are on-premises in remote work locations or the cloud
have similar requirements. CSMA helps in the reduction of the overall risk
to an enterprise (business) infrastructure and services significantly by
reducing the number of tools required to achieve security optimally.
CSMA
The adoption of CSMA has gained positive traction, especially with the
increase in remote work arrangements and the widespread use of cloud
solutions. Enterprises (businesses) have been prompted to reassess data
access and control policies due to the evolving landscape, which has led to
the implementation of new technologies.
The increase in cyberattacks in recent years has further emphasized the
need for comprehensive cybersecurity measures, leading to the growth of
the cybersecurity mesh market.
Market dynamics
Let us now seek some of the key drivers of the adoption of CSMA.
Conclusion
Enterprises (businesses) need to adopt CSMA and build a solid baseline for
safeguarding their digital assets. This becomes increasingly important in an
ever-changing cybersecurity threat landscape. We have seen how the
implementation of CSMA presents its challenges. These can be managed
via thorough assessments, vendor collaboration, and comprehensive user
training (education).
In summary, CSMA unveils the future of cybersecurity through a holistic
and integrated approach, and enterprises (businesses) can strengthen their
cybersecurity posture by adopting CSMA.
Points to remember
As we take on board a future dotted with pervasive connectivity and
sophisticated cyber-attacks/threats, it is understood that approaches to
cybersecurity that are traditional and siloed will not serve well. The shift
towards CSMA is not just preferred, it is vital.
Toward the end of this chapter, let us summarize the practicalities of how
enterprises (businesses) can adopt this innovative approach to
cybersecurity:
Figure 9.1: Steps for adopting an innovative approach to cybersecurity
The journey towards robust and unified cybersecurity may come across as
complex, but the rewards are commensurate with the effort. By adopting
CSMA, enterprises (businesses) can safeguard the present and make the
way for a safe and secure digital future.
As we conclude this book, remember that cybersecurity is a continuing and
endearing journey. A journey that necessitates constant vigilance,
continuous learning, and an inclination to adapt and evolve.
Key terms
Key performance indicators: A measure (quantifiable) of
performance over time for a specific objective.
Operational technology: The hardware and software that is used in
industrial settings to monitor and control devices, processes, and
infrastructure.
Virtual private network: A mechanism for creating a secure
connection between a computing device and a network, or between
two networks, using the public Internet.
Virtual machines: Is a physical computer’s digital version. The digital
version uses software (instead of a physical computer) to run programs
and deploy applications.
Microservices: An architectural approach to software development
wherein software comprises small independent services that
communicate over APIs.
The Open Worldwide Application Security Project: An online
community that provides free resources viz., articles, methodologies,
documentation, tools, and technologies in the fields of IoT, system
software, and web application security.
Industrial control systems: An electronic control system and
associated instrumentation used for industrial process control.
The Health Insurance Portability and Accountability Act: A
federal law (national standard) aimed at protecting sensitive patient
health information from being disclosed without the patient's consent
or knowledge.
NIS2: EU-wide legislation on cybersecurity that provides legal
measures to enhance the overall level of cybersecurity in the EU
Electronic health record: Collection of patient health information in a
digital (electronic format)
Answer key
B
Business Email Compromise (BEC) 36
C
California Consumer Privacy Act (CCPA) 55
chief information security officers (CISOs) 44
Cloud Access Security Broker (CASB) 94
cloud attacks 40
Cloud Security Posture Management (CSPM) dashboard 96
Cloud Service Provider (CSP) 40, 51, 78
commercial antivirus 5
computer crime 5
computer virus 5
Creeper 4
cryptojacking attacks 34
CSMA adoption 170
global market overview 171
growth factors 171
market dynamics 172-174
CSMA adoption, key aspects 113
automation 114, 115
comprehensiveness 114
integration 113, 114
CSMA components 92, 93
automated operations 95
centralized operations 95
comprehensive security intelligence 94, 95
consolidated dashboards 96
distributed identity fabric 94
important component 96
integrated data 93, 94
CSMA in healthcare industry 167-170
CSMA solutions 134
AI graph 134
data normalization and correlation 134
generative AI for context enhancement 135
natural language processing (NLP) 135
cyber resilience 64
building blocks 65, 66
importance 64, 65
cybersecurity
building blocks 18
impacting, by major shifts 15-17
traditional measures 19, 20
cybersecurity attacks 31
cloud attacks 40, 42
cryptojacking attacks 34, 35
Denial-of-Service attack 42, 43
injection attacks 43
insider attacks 41
Internet of Things (IoT) attacks 38
malware attacks 31, 32
man-in-the-middle (MitM) attacks 41
Phishing attack 36
ransomware attacks 33, 34
social engineering attacks 36
state-sponsored attacks 40
supply chain attacks 35, 36
cybersecurity ecosystem
current situation 70, 71
cybersecurity events
noteworthy events of 2013 11
noteworthy events of 2014 11, 12
noteworthy events of 2015 and 2016 12
noteworthy events of 2017 12, 13
noteworthy events of 2018 13
noteworthy events of 2019 14
noteworthy events of 2020 14
noteworthy events of 2021-2023 and beyond 14
cybersecurity evolution 2
ARPNET 4
commercial antivirus 5
connected world 6
Creeper 4
first DOS attack 5
Reaper 4
time before networking 2
timeline view 10
time of early hacking 3, 4
time of email 6
time of phone phreaks 3
cyber security future trends 58
5G network security 60
AI-assisted security testing 61
AI-driven cybercrime 62
common themes 62-64
cryptography resistant to quantum computing 60
cyber insurance 61
ethical hacking and bug bounty programs 62
human-centric security 60, 61
smart cities and critical infrastructure security 62
stronger authentication measures 60
zero trust 59, 60
cybersecurity key issues 44
artificial intelligence issues 45, 46
budgets issue 44, 45
skills gap issue 45
cybersecurity landscape today 110, 111
adoption of cloud 112
attack surface expansion 111, 112
Cybersecurity Mesh Architecture (CSMA) 71
adoption considerations 119-122
befitting vendor(s) 118
benefits 78-85
benefits of leveraging 127-131
challenges 73-78, 158, 159
characteristics 131, 132
comparing, with other architectures 152, 153
compatible tools, evaluating 117, 118
consolidation 118
current tools and identify gaps, assessing 116
implementing 150-152
key components, building 116, 117
key performance indicators 153, 154
layers, illustrating 71, 72
necessity 127
need for 72
performance 108-110
pitfalls, of not leveraging 135-140
products/solutions 98-102
real-life scenario 149, 150
review and revise 119
revisit 90
salient points and goals 147, 148
scalability relative, to other architectures 92
target use cases 133
ten commandments 154-158
unified architecture 96, 97
versus, defense-in-depth approach 144, 145
working 92
working relationships, with zero trust 91
working with 115
cybersecurity threat canvas expansion 6, 7
Anonymous 7
artificial intelligence, using 9
GDPR 8
Operation Aurora 8
remote and hybrid work 9
SolarWinds attack 9
Stuxnet 8
X hack 8
cybersecurity threats 29, 30
evolution 17
Life Stages (LS) 17, 18
sources 30
cybersecurity trends 49, 50
AI power 53
board room agenda 58
continued prominence of regulations 57, 58
cyber resilience 58
cyber warfare, intensifying by rogue nations 53
data privacy 55
Deepfakes threats 56, 57
emphasis on incident response and recovery 58
enhanced automation 54
imminent cloud security threats 51, 52
IoT threats 53
IT skills gap widening 56
multi-factor authentication (MFA), improving 54
rise in insider threats 56
risks of distributive workforce 55, 56
smarter social engineering attacks 51
supply chain attacks 57
tenacious data breaches 50
threat emanating due to mobile devices 52
upsurging ransomware 51
D
Denial-of-Service attack 42
denial of service (DoS) 30
Disaster Recovery as a Service (DRaaS) 34
Distributed Denial of Service (DDoS) attacks 32
distributed systems 26, 27
security challenges 27-29
domain name server (DNS) 42
E
early hacking 3
Early Internet 4
electronic health record (EHR) 169
ethical hacking 4
European Union (EU) 8
F
first DOS attack 5
G
General Data Protection Regulation (GDPR) 8, 55
Generative AI (GenAI) 38
phishing attacks 38
H
hacking 3
Health Insurance Portability and Accountability Act (HIPAA) 168
HTTP flood DDoS 42
HTTPS spoofing 42
HyperText Transfer Protocol Secure (HTTPS) 6
I
ICMP flood 43
Identity and Access Management (IAM) 18
Infrastructure as a Service (IaaS) 90
injection attacks 30, 43
vectors 43, 44
insider attacks 41
Insider Threat 8
Internet Chat Relay (IRC) channel 7
Internet of Things (IoT) attacks 38
privacy concerns of connected cars 39
smart medical devices and electronic medical records vulnerabilities 39
Internet Protocol spoofing 42
Intrusion Prevention Systems (IPS) 17
K
key performance indicators, CSMA 153, 154
L
lightweight directory access protocol (LDAP) 44
M
machine learning (ML) 51
machine learning (ML) algorithms 9
malicious software 31
malware attacks
adware 32
cryptojacking 32
fileless malware 32
ransomware 32
spyware 32
trojans 32
viruses 32
worms 32
Managed Service Providers (MSPs) 35
man-in-the-middle (MitM) attacks 30, 41
examples 41, 42
Mean Time To Detect (MTTD) 28, 75
Mean Time To Remediate (MTTR) 28, 75
Micro, Small, and Medium Enterprises (MSMEs) 40
modular 92
multi-factor authentication (MFA) 9, 16
N
natural processing language (NLP) 53
Network and Information Security (NIS2) Directive 168
network time protocol (NTP) 43
next generation set 70
O
operating system (OS) security 7
Operation Aurora 8
OT security environment 166, 167
P
payload malware 18
Personally Identifiable Information (PII) 15, 55
Phishing attack 36, 37
phone phreaks 3
polymorphic viruses 6
R
Ransomware-as-a-Service (RaaS) 34
ransomware attacks 33, 34
Reaper 4
return on investment (ROI) 44
S
Secure Sockets Layer (SSL) protocol 6
Security Information and Event Management (SIEM) 28
Security Operations (SecOps) 26
social engineering attacks 36
Software as a Service (SaaS) 90
SolarWinds attack 9
SolarWinds Supply Chain Attack 9
spear-phishing 36
state-sponsored attacks 40
Structured Query Language (SQL) query 43
Stuxnet 8
supply chain attacks 35
SYN flood DDoS 42
T
target use cases, CSMA
compliance management 134
security operations 133
vulnerability management 133
The Orange Book 5
Trojan horse 5
U
unified architecture, of CSMA 96, 97
accelerated through automation 98
extensive 97
integrated 97, 98
unique identifier (UID) 38
user datagram protocol flood DDoS 43
user datagram protocol (UDP) 43
V
virtual machines (VMs) 165
virtual private networks (VPN) 162
vishing 37
W
WannaCry ransomware (2017 event) 16
whaling 37
work-from-home environment 162
endpoint detection and responses 163, 164
home network security 164-166
zero-trust network access 162, 163
X
X hack 8
Z
zero day attack 7
Zero Trust Architecture (ZTA) 59