If you like DNray Forum, you can support it by - BTC: bc1qppjcl3c2cyjazy6lepmrv3fh6ke9mxs7zpfky0 , TRC20 and more...

 

Security management through ServiceNow, Remedy, JIRA and more

Started by mishraviplav7877, Aug 15, 2022, 09:55 AM

Previous topic - Next topic

mishraviplav7877Topic starter

Four incorrect approaches to cloud security are commonly held among business owners and managers. The first is the belief that cloud services are inherently secure and do not require additional cybersecurity measures.



The second approach is that the responsibility for securing cloud services lies solely with the cloud provider, as they are paid for VPS services. The third opinion, shared by both information security specialists and businessmen, is that clouds are inherently dangerous. Lastly, some believe that standard antivirus programs provide adequate protection for cloud frameworks.

However, all these approaches are misguided and can lead to significant losses for businesses. For example, companies that do not use any defence for virtual machines or rely solely on standard antivirus programs spend nearly a million dollars per year on incident recovery. This does not take into account direct losses for restoration and replacement of equipment and software or indirect losses such as damage to the company's reputation and compensation payouts to affected clients.

The first approach, that clouds are inherently secure, is particularly dangerous as it underestimates the potential threat of malware and ransomware, which account for 27% of all cloud threats. Insecure interfaces and unauthorized access are also significant vulnerabilities, making up about 80% of all cloud threats. Hаckers find virtual infrastructure especially attractive as they can gain access to all virtual machines and data at once. Furthermore, malicious code can spread rapidly within a virtual framework, infecting tens of thousands of machines in minutes.

It is essential for businesses to adopt a comprehensive approach to cloud security, utilizing specialized security tools designed explicitly for virtual environments. This approach will help safeguard against potential losses and reputational damage caused by security breaches.

VMware developed an agentless defense solution, which is only available on its solutions. Two additional virtual machines are deployed on the physical server with virtual machines: the Protection Server (SVM) and the Network Protection Server (Network Attack Blocker, NAB). The SVM installs only the antivirus engine, while the NAB machine checks communications between the virtual machines and the ecosystem. The SVM checks all traffic coming to the physical server and constitutes a pool of verdicts, which is accessed by each SVM first, instead of scanning the entire system. This principle reduces resource costs and speeds up the ecosystem.

Kaspersky developed a light agent defense solution, which is not limited by VMware. An anti-virus engine is installed on the SVM, and a light agent is installed inside each WM. The agent monitors everything that happens inside the native WM based on the technology of self-learning networks. This technology remembers the correct sequence of applications and blocks it when the sequence of actions of the application inside the WM is wrong.

Businesses can integrate various tools to prevent or fix cloud security issues, such as change management platforms, security scanning tools, configuration management tools, and tools for secure notification management. For example, TrueSight Server Automation, IBM BigFix, and OpsGenie are some of the available tools.

To protect against exploits caused by vulnerabilities in software, developers should fix bugs in their product, and users should install timely service packs and patches. Automatic exploit defense is built into the Kaspersky Security for Virtualization Light Agent application described above.
  •  


BrettUK

Are you looking for 0.5 Mbps of free protection against dDos attacks? This will help safeguard your server from any level of attack, as the traffic will be capped at a predetermined speed.
  •  

jasonbean

Both VMware and Kaspersky have developed defense solutions specifically tailored for virtual environments. VMware's agentless defense solution includes deploying two additional virtual machines, the Protection Server (SVM) and the Network Protection Server (NAB), which install the antivirus engine and monitor communications between virtual machines, respectively. This approach helps reduce resource costs and speeds up the ecosystem.

On the other hand, Kaspersky offers a light agent defense solution that involves installing an antivirus engine on the SVM and a light agent inside each virtual machine. The agent utilizes self-learning network technology to monitor and block any incorrect actions within the virtual machine.

In addition to these defense solutions, businesses can integrate various tools like change management platforms, security scanning tools, configuration management tools, and tools for secure notification management to prevent and address cloud security issues effectively. TrueSight Server Automation, IBM BigFix, and OpsGenie are some examples of available tools.

To protect against exploits caused by software vulnerabilities, developers should fix bugs in their products, while users should ensure timely installation of service packs and patches. Automatic exploit defense, as provided by Kaspersky Security for Virtualization Light Agent application, can contribute to this aspect of cloud security.


ServiceNow, Remedy, and JIRA are widely used IT service management (ITSM) platforms that can also be utilized for security management. Here's a brief overview of how these platforms can assist in security operations and incident management:

1. ServiceNow: ServiceNow offers a comprehensive suite of tools for ITSM, including security management capabilities. Its Security Operations module helps organizations streamline and automate security incident response processes. It provides features like incident prioritization, task assignment, collaboration, and tracking to ensure efficient handling of security incidents. ServiceNow also integrates with various security tools, enabling the ingestion of threat intelligence and automated response actions.

2. Remedy: Remedy (now known as BMC Helix ITSM) is another popular ITSM platform utilized by organizations. While it may not have specific security management modules, it can be leveraged for incident and problem management related to security incidents. Remedy allows for the creation, tracking, and resolution of security incidents through its robust ticketing system. It can also integrate with other security tools and systems to provide a centralized view of incidents and enable effective response and remediation.

3. JIRA: Although JIRA is primarily known as a project management and issue tracking tool, it can be adapted for security management purposes. Organizations can create customized workflows, issue types, and dashboards in JIRA to manage and track security incidents, vulnerabilities, and related tasks. JIRA's flexibility allows teams to define their own security processes and collaborate effectively on incident response and remediation efforts.

These platforms, along with others in the ITSM space, can serve as centralized repositories for security-related incidents, facilitate collaboration among security teams, and provide visibility into the status of security incidents and remediation efforts. Integration with other security tools and services is often crucial to leverage the benefits of these platforms fully.

It's important to note that while these platforms can support security management, they are not dedicated security tools. Organizations may still need to supplement them with specialized security solutions such as SIEM (Security Information and Event Management) systems, vulnerability scanners, and threat intelligence platforms to address the full spectrum of security management requirements.
  •  


If you like DNray forum, you can support it by - BTC: bc1qppjcl3c2cyjazy6lepmrv3fh6ke9mxs7zpfky0 , TRC20 and more...