Ticking time bombs in your data center

Feb. 9, 2018

Decisions a company made about its IT processes, procedures, and applications five, 10, even 15 years ago can suddenly and catastrophically affect a company today. The result is that security breaches can be caused by complex issues that are poorly understood outside of one or two people who might not even be at the company anymore.

Bring-your-own-device policies and remote office environments are a new norm for the modern workforce, providing greater convenience, efficiency, and, in some cases, cost savings—and SSH (Secure Shell) keys are the foundation by which these practices can run securely. In theory, SSH keys ensure that endpoints are encrypted and secure, only accessible by those in possession of these keys.

But the unfortunate reality is that SSH keys are easily propagated and “misplaced,” which is a huge regulatory compliance risk. Moreover, by granting access to every nook and cranny of the data center, SSH keys also open up the potential for users to access areas of the data center they’re not authorized to touch, and in more malicious cases, increase their access privileges unchecked.

To combat these misplaced keys and guarantee compliance, an enterprise should invest in technologies that implement additional security controls that can be used to augment SSH keys. They need to bring in automation to seamlessly manage existing and rogue SSH keys in their infrastructure. This will eliminate human errors and will help an enterprise stay on top of any threat arising from mismanagement of SSH keys.

Programming is the linchpin of the modern data center, the building block for developing all manner of software that makes navigating enterprise IT easier. That being said, one of the data center’s biggest threats lies in this foundation of its composition: Complex legacy code. If you look at the flaws that lead to most breaches, they aren’t so much on algorithmic levels as they are on primary levels, rooted in the legacy code. As the data center moves to the cloud and is forced to update existing protocols, reining in the small but powerful lines of stray programming becomes more critical than ever.

In order to compensate for these Achilles’ heels, IT teams must ensure that there are proper measures in place to both spot these errors and revise them. If the software is too far down the rabbit hole to be revised at a foundational level, additional layers of security can be enforced through management and automation controls that prevent these time bombs from allowing breaches.

The second point brings us to the third and final hand-me-down security challenge in your data center: Application security. IT teams are constantly adding to the portfolio of third-party vendors they’re bringing into the fold, hoping to make processes run quicker, cheaper, and more efficiently. The developers who build and understand these applications, however, are at a fundamental level not the ones who are securing them. For them, security is approached as a point in time rather than as an integral part of the application development process and ongoing maintenance.

Management and automation tools to regulate these applications can ensure that these data center processes retain compliance across the enterprise. The most practical solutions for maintaining application security are able to adapt to the guidelines enforced by an IT team’s specific industry, whether that’s healthcare, retail, banking, or something else. If the technology is able to provide a single pane-of-glass view of a multivendor environment, all the better.

Dark Reading has the full story

Sponsored Recommendations

The Race to Replace POTS Lines: Keeping Your People and Facilities Safe

Don't wait until it's too late—join our webinar to learn how healthcare organizations are racing to replace obsolete POTS lines, ensuring compliance, reducing liability, and maintaining...

Transform Care Team Operations & Enhance Patient Care

Discover how to overcome key challenges and enhance patient care in our upcoming webinar on September 26. Learn how innovative technologies and strategies can transform care team...

Prior Authorization in Healthcare: Why Now?

Prepare your organization for the CMS 2027 mandate on prior authorization via API. Join our webinar to explore investment insights, real-time data exchange, and the benefits of...

Securing Remote Radiology with the Zero Trust Exchange

Discover how the Zero Trust Exchange is transforming remote radiology security. This video delves into innovative solutions that protect sensitive patient data, ensuring robust...