Introduction to 3 Rs of Security
Every organization has a security policy. Most of the policies believe in having full patched and hack-proof system and then resist to change the setup as reconfiguration may lead to leaving some security flow. But the current infrastructure security scenario is entirely different. It needs to act fast and make changes. Continuous improvement and adjustments are required to make a full secured organization. Organizations need to follow Three Rs of Enterprise security – Rotate, repair and repave in the way of continuous delivery and infrastructure automation. Rotate the stack credentials every few minutes or hours. Repave every server and application in the every few hours from a recognized good state. Repair vulnerable operating systems and application stacks consistently within hours of patch availability.
Traditional approaches to organization security often make things down and slow the speed of change. However, we know that the more time the attacker has to compromise with the system, there are more chances for the potential damage.The most significant concern in computer System in today’s era is security. The Three Rs of Security is the approach towards the safety of cloud deployments. It eliminates possibilities for the attacks. The basic theory of Three Rs Enterprise Security model is that if more time is given to attacks, the more opportunities is given them to cause damage. Therefore, it is best to change and move quickly.
Advanced Persistent Threats – Blocking the attacker way
An advanced persistent threat is an armed attack on the target to get data and valuable information rather than causing damage to the organization. This attack remains undercover for a long time and silently learns how the whole stack works and finally accessing sensitive data if we know how the attack works, we can learn how to stop them.
To launch an attack, an attacker needs three things 1) time 2) leaked credentials 3) unpatched software.Three Rs of Enterprise Security addresses all the three ingredients and helps to eliminate each loophole.
How tradition security differs with the current security policy needed
|Tradition security||Rotate, repair and Repave|
|Monitored and instrumented systems – Organizations setup monitoring to find the changes whenever the security is breached||Automated – System needs to be quickly updated. Automation and immutable infrastructure can help to remove the system from having security breached configurations.|
|Reactive – Detecting the threat is the priority and then further solving the vulnerability||Proactive – The priority is to change the state of the system so the malware could not also replicate and survive.|
|Patched incremental – Patches are applied for on the old systems step by step to eliminate the issue.||Fresh, clean state deployment – Instead of patching the old systems, new clean images are used to deploy the things in an automated way.|
|Resisting changes – It prefers to patch the old systems which are resisting to changes.||Promoting changes – This approach deals in changes faster and is secure.|
What problem does the 3 Rs model solve?
The basic premise of Three Rs of Enterprise Security model is that the more time you give to the attacks, the more opportunity they will get to cause some severe damage. So it is best to embrace the change and move quickly. With DevOps, it becomes possible to deliver the software faster. Therefore, to get safer, you have to go faster.
The 3 Rs of Enterprise Security – Rotate, Repave, and Repair
Rotate – The datacenter’s credentials should be rotated after every few minutes. These credentials can be any certificates, passwords, or the access tokens.As sometimes you can’t stop the credentials from getting leaked, but by rotating them after every few hours or minutes, it is difficult for the attackers to get hands on these credentials.
Repave – Rebuild every server and application in the data center from a known secure state. Instead of patching the particular software, you can also repair the whole stack by destroying the old containers and VM’s and rebuild them from a known secure state.
Repair – Vulnerable operation system should be repaired by applying patches as soon as they are available.
Making DevOps Secure by Default
We at Xenonstack help companies and startups to make a cultural shift to DevOps along with doing the security best practices implemented by default. Most attackers target applications and Operating systems with know vulnerabilities. Things like many patches to the operating system, applying proper roles and access control along with secure networks, helps a lot to reduce the reduces the number of exploitable available to an attacker. Get an insight about AWS, Google and Microsoft Azure Security Checklist.
Many organizations realize that the security needed to be added before the development process instead of keeping it in Q&A In the software development life cycle. Moving the security testing to earlier in the development cycle, they have a much higher rate of success and much higher throughput. The efficiency increased as developers don’t have to wait for the security to do the things. All the penetration testing goes along with the development, decreasing the time in the delivery of the applications.To understand more about the security solutions we recommend taking the following steps –
How useful was this post?