Secure Beyond Breach

Chapter 9


Conclusion

Building a Defense-in-Depth Strategy

In this book we have outlined the core principles and detailed steps required for an organization to implement a micro- segmentation strategy. It starts with leadership at the executive level and with hiring smart leaders to drive innovation across the organization, bringing together key teams and preparing the organization for success.



Along the way, your team needs to swallow the green pill of metadata to facilitate labeling and security management. From there you can identify your most important applications, especially those which have regulatory requirements, and begin the project – starting with early wins and avoiding the temptation to “boil the ocean” and secure all applications at once. In setting policy, you make choices about what matters most for your organization, taking a risk-based approach to the policy decision process. Specific choices need to be made regarding public cloud and containers. Finally, you plan for sustainment.

Cybersecurity can be daunting to those that don’t understand it well. Success starts with a strategy. The good news is that, unlike threats in other arenas such as terrorism, organizations can take steps on their own to change their terrain, upend the adversary’s map of the world, and keep intruders from accessing the most important data.

The cybersecurity story has evolved over the last decade. It moved from a limited domain, affecting only coders and computer scientists, to impacting all of us. As the threat has grown worse, smart people have run toward solving hard problems. Top-tier talent have entered the field; teams have developed and learned how to operate in complex environments, from security teams at global financial institutions to the evolution of U.S. Cyber Command. The market has also evolved and cutting- edge security technologies are now available to organizations.

Leaders can drive significant change by deploying micro-segmentation within their new security stack of investments. Micro-segmentation is a wise strategic choice and a key enabler of a defense-in-depth strategy.

If you have any questions, please contact Illumio by email at info@illumio.com, by phone at +1-855-426-3983, or on Twitter at @illumio.

 

Ebook

Secure Beyond Breach

Building a Defense-in-Depth Cybersecurity Strategy Through Micro-Segmentation

Secure-Beyond-Breach-1091x849-Aug2020

Try Illumio Edge

The browser you are using doesn't support our submission form. Please consider an alternative browser or disabling the private browsing feature.

A phone call works too: 1-855-426-3983

Swag Request

The browser you are using doesn't support our submission form. Please consider an alternative browser or disabling the private browsing feature.

A phone call works too: 1-855-426-3983

Try Illumio Core

The browser you are using doesn't support our submission form. Please consider an alternative browser or disabling the private browsing feature.

A phone call works too: 1-855-426-3983