FEDTECH: Defense in depth involves relying on multiple platforms in combination to reduce the risks associated with cyberattacks. From your perspective, how important is this approach to securing IT systems?
HARTSOOK: When we talk about defense in depth, we’re looking at the entire IT enterprise and recognizing the value of having layers of protection to detect and block malicious activity. The operating environments of agencies are much more decentralized now with mobile devices, the move to the cloud and people working anywhere and everywhere. This means the attack surface is much larger for cyber adversaries, and from a defender’s perspective, the ‘protect surface’ is more complicated and more sprawling than ever. That’s driving the need for multiple cybersecurity capabilities, including tools that are often specific to the systems you’re protecting. The challenge is, how do you tie everything together to create an integrated set of technologies that aren’t duplicative?
SPAETH: Zero-trust architecture is the VA’s North Star, and we’ve built our cybersecurity strategy around it. Defense in depth is part of that strategy, and it starts at the perimeter with the systems we’ve deployed to protect it. We have firewalls, boundary routers with special rules, email proxies and other defenses. We then start layering down: We have tools on our networks applying more protections, access controls and analyzing traffic flows. Our endpoints and servers are protected with multifactor authentication and cybersecurity toolsets to ensure full defense in depth. We have robust vulnerability scanning capabilities for the internal and external networks and also have additional scanning through CISA’s Cyber Hygiene services. We have different types of assessments that test these controls and identify any weakness to be remediated within the enterprise. Our cybersecurity operations center has full 24/7/365 capabilities teamed with different toolsets to give them telemetry to identify and respond to incidents. Overall, we have somewhere between 50 and 75 different platforms and toolsets we’re using for cybersecurity.
HERNANDEZ: Defense in depth and diversity of defenses have always been important in cybersecurity; it’s just that now we have all of these new technologies we can use to make the approach more effective. We have the agility, speed and elasticity of the cloud, and we have the power of AI and machine learning. And when we take those advanced capabilities and apply them to traditional defense-in-depth security, that’s when we start to move toward zero trust. One core element we’ve put in place is secure access service edge, which lets us encrypt all traffic at all times and make sure that traffic is available for security inspection. Security orchestration, automation and response is a second area we’ve focused on, and then the last area is identity and access management. We use different vendors for SASE and SOAR, and we have three vendors for authentication, depending on the technology.
RELATED: Keep access management simple and secure.
FEDTECH: If best practice is to depend on multiple security platforms, how do you ensure you’ve deployed the right mix and aren’t using tools you don’t need?
HARTSOOK: Sometimes we see situations where tools aren’t fully integrated and operationalized, and cybersecurity staff aren’t using them to their greatest benefit. And sometimes you have certain tools that play more nicely with others. One thing we recommend is to have a process for tool rationalization. You want to have the right balance to get coverage across the full IT protect surface, but in such a way that it’s harmonized and isn’t just layering for the sake of layering.
SPAETH: We’re currently doing a full tool rationalization: inventorying all the technologies the VA owns and identifying capabilities that either cross over or where we have gaps, where a tool is really needed. Part of that also entails tuning the technologies so we’re sure we’re getting the most out of them.
HERNANDEZ: I like the term “requisite diversity.” What diversity of platforms and vendors do we need to be successful? When we were on our journey toward maturing with zero trust, we eliminated 25% to 30% of our security tooling because it overlapped with the capabilities we were bringing on board. In certain places, it makes sense to deliberately introduce some diversity, while in others you will find there are risks to managing and maintaining multiple capabilities while trying to get them to play well together.