You are on page 1of 9

Next

Security spotlight:
The cost of human
error and the advantages
of automation
Why organisations are reconsidering manual approaches to managing security,
and how intelligent automation helps to prevent potential threats from slipping
through costly cracks.
Previous Next

In this eBook:

2
Previous Next

01 Introduction
Cybercrime is on the rise For example, most Australian federal government
Cybercrime is rife right now. As companies agencies must now comply with the ACSC Essential
embrace digital transformation and adapt to Eight risk mitigation strategies. And the proposed
hybrid models of work, cyber attackers are Security Legislation Amendment (Critical
on the move, too. One can almost hear them Infrastructure Bill) 2020 (Cth) may increase the
rubbing their hands together at the prospect regulatory burden on any organisation that deals
of invading this rapidly evolving landscape. with critical infrastructure – from communications
The cost to business is growing fast and, even and financial services companies, to food and
within organisations with seemingly watertight grocery providers.
cybersecurity strategies in place, risks abound.
Shoring up your defences
Last financial year, the Australian Cyber Security The best place to start with cybersecurity?
Centre received over 67,500 reports of Looking at where existing flaws lie. Too often,
cybercrime – a rise of 13 year on year – with even with the strongest cybersecurity strategies
self-reported losses totalling over $33 billion. in place, human error gets in the way of compliance.
Of these incidents, roughly one quarter of them Small mistakes lead to huge holes in your system,
affected entities associated with Australia’s and this is where the cybercriminals get through.
critical infrastructure. It’s why organisations are now looking to automate
as much of their security strategy as possible.
Outwitting the cybercriminals
As cybercriminals become craftier, organisations In this report, we’ll explore the human-induced
must become smarter about how they handle risks in the fight against cybercrime and show
cybersecurity. In fact, there’s growing pressure on how automating key cybersecurity risk mitigation
organisations to comply with more comprehensive strategies helps remove the burden on IT while
rules and regulations when it comes to data shoring up your overall defences.
security and privacy.

Ouch. The cost of cybercrime in Australia.

67,500
Reported cyberattacks

$33 billion
In self-reported losses

13
Growth in number of attacks, YOY

Source: ACSC Annual Cyber Threat Report, 2020-21

3
Previous Next

02 Security is
a human problem
Humans make mistakes Skills shortages make things worse
We are an optimistic species. Guided by a ‘glass Compounding the issue of human error is the
half full’ attitude, we often underestimate or fact that cybersecurity skills are in short supply.
misinterpret risk. For example, many believe There are simply not enough people out
flying is more dangerous than driving. In reality, there who truly understand how to assess and
the likelihood of fatality from a car accident is far address security risks. According to the (ISC)²
higher than the likelihood of a plane crash. Cybersecurity Workforce Study, Australia needs
25,000 more cyber security workers to close its
What does this have to do with cybersecurity?
cyber security gap.
Our inability to accurately assess risk has a huge
impact on security. For example, say a technician This chronic shortage of cybersecurity experts
manually updates a firewall. They make one makes it hard for organisations to adequately
small mistake, which they don’t perceive to be manage risk. Resources are stretched, and IT
a problem. Yet this tiny error exposes a critical professionals don’t have the time to enforce
vulnerability, which the cybercriminals quickly security processes across the organisation –
pounce on. let alone establish them in the first place.
From patching applications and updating firewalls,
Augmenting it all with automation
to setting and enforcing administrative privileges,
so many elements of the security puzzle are at To solve the twin problems of human error and
risk of human error. And as cybercriminals get skills shortages, automation is proving essential
better at identifying human vulnerabilities, in the fight against cybercrime. As we will explore
these human errors can have detrimental or below, it provides much-needed consistency,
irrecoverable consequences. accuracy and scalability across the organisation.

Oops. Humans aren’t perfect.

“Inadvertent breaches from human


error and system glitches were the
cause for nearly half (49 ) of the
data breaches.”
Source: IBM Cost of a Data Breach Report, 2019

4
Previous Next

03 Common challenges
Today’s security legislation Yet organisations face a range of obstacles
requires automation In the quest to enhance security, organisations face
To counter the growing threat of cybercrime, several challenges – particularly around how to
regulators are tightening the rules for companies manage change. Common questions include:
that deal with data. Organisations need to be ready. • How do we scale our team to implement a new
The proposed changes to the Critical Infrastructure cybersecurity initiative?
Bill 2020, for example, could affect thousands
of organisations in Australia – adding a new layer • How do we support different parts of the
of responsibility around security and reporting organisation to ensure new security protocols
on infrastructure. are adhered to?

Failure to adhere to the rules could give •How do we better secure our existing legacy
government the power to take over the reins systems, which delivery critical services,
of a company until they can prove an ability to while maintaining the new levels of security
operate securely again. the organisation demands?
• Can we implement strategies like zero trust on
legacy architectures?
Instead of seeing all this as a burden, though,
organisations can view proposed rules and growing
threats as an opportunity to reassess their security
practice and implement more rigorous protocols.

Common cybersecurity challenges

38
Keeping up with rapidly changing threats

34
Educating about risk and behaviour

31
Shoring up internal cyber security posture

30
Need for cybersecurity training

30
Legal/financial ramifications of data breaches

Source: CompTIA, State of the Channel 2021

5
Previous Next

04 Security automation
Automating key elements of your
cybersecurity strategy
To reduce risk and help combat cybercrime, turning to the Essential Eight for risk management.
organisations are turning to cybersecurity And many are finding that, while it provides
automation. By automating mundane, a valuable framework, it does not deliver a way to
repeatable work, cybersecurity teams can focus consistently reduce human error – especially in
on more critical, strategic tasks. Plus, automation this period of constrained resources, higher demand
helps overcome the obstacles that arise due to for technical skills, and lack of skilled employees.
both human error and human limitations. Increasingly, IT leaders are realising that some
Let’s use the ACSC Essential Eight as an example elements of the framework can and should be
of how automation can support security strategies. automated. Here are some examples of where
Even though this framework was originally intended automation makes sense.
for government agencies, more organisations are

Automating the ACSC Essential Eight

Application control Application and operating Backup and restore


system patching
Automated changes to Automated backup,
application control state Automated pre-flight checks, restore and verification testing
across the hybrid cloud content promotion,
and post-update verification
and testing

6
Previous Next

Perfecting the process of patching Managing administrative privileges


For example, to help prevent attacks, the Essential To limit the extent of attacks, the Essential Eight
Eight recommends that organisations patch recommends that you restrict administrative
applications and regularly apply updates to protect privileges. Controlling privileged access helps
against malicious security issues. It’s not only best secure infrastructure and applications, run business
practice to patch applications as soon as you’re processes efficiently, and maintain the confidentiality
alerted to updates, but it’s often a regulatory of sensitive data and critical infrastructure.
requirement too. The problem is, patching is Only a small handful of people within your
always subject to human error and it can take organisation should have global control.
a huge amount of time in large organisations. Working out who should have privileges is hard;
creating a small ‘blast zone’, so that if someone
Patching is a great use case for automated
misuses their credentials it doesn’t affect the
workflows. Instead of relying on an IT employee
whole organisation, can be harder.
to perform testing, set up pre-flight checks and
run the patches, it’s now possible to automate By automating privileged access management
verification and testing – so it all happens smoothly, workflows and storing access credentials centrally
seamlessly, and securely behind the scenes. – without needing to inject these into applications
where they can potentially be leaked – the whole
process becomes much simpler and more reliable.

“It is simply unrealistic to expect human teams to catch


potential cybersecurity events reliably. Implementing
automation could be vital in order to reliably protect
your organisation and ensure resilience through robust
and repeatable processes.”
Source: Forbes, 2019, Is cybersecurity automation the future?

7
Previous Next

05 Red Hat’s role


Building a future-proofed cybersecurity practice
The Red Hat platform automates previously manual processes, helping to mitigate the risk of oversights
caused by human-based constraints. The open-source solution delivers flexibility and scalability across
clouds and architectures, enabling organisations to deploy in their current and future environments.
With automation at the pinnacle of any cybersecurity maturity model, the good news is there are
practical steps that any organisation can take today to iteratively add layers of automation, and strip out
manual processes. Here’s how key Red Hat solutions can help with both risk mitigation and response.

Red Hat Ansible Automation Platform Red Hat Enterprise Linux (RHEL)
Red Hat Ansible is a human-readable automation RHEL takes a practical, 3-point approach to
language that takes complex manual processes addressing security challenges: mitigate, secure,
and turns them into automated workflows. and comply.
It automates and integrates different security Scanning and remediation is built-in to RHEL,
solutions that can investigate and respond to removing the burden of manual effort. Application
threats across the enterprise in a coordinated, control is a critical risk mitigation strategy in the
unified way using a curated collection of modules, ACSC Essential Eight guide, which helps ensure
roles and playbooks. that non-approved applications – including
For example, Red Hat Ansible automates: malicious code – are prevented from executing.

• Patching for common vulnerabilities and exposures


•A
 pplication control updates for new applications
• Backup and restore/verification processes

8
Securing your future
Red Hat is here to help secure your organisation’s future
No business leader wants to face the scrutiny of their Board
following a cyber attack that results from human error or a lack of
the right risk mitigation strategies. Red Hat can help you plan and
implement a solid cybersecurity framework – so you can state with
confidence that your organisation is doing all it can to reduce the
risk or severity of an attack.

You might also like