SlideShare a Scribd company logo
Applying Lean Methodology for Cyber Security Management*
.
Over the years manufacturing industries have adopted TQM (Total Quality Management) systems such
as Lean and 6 Sigma with great deal of success. In recent times, these systems have been implemented
in service industries with varying degree of success. Lean or Toyota Way as it has come to be known, has
its roots in Toyota Production System (TPS ) which can adopted for cyber security operations by
applying same principles.
Toyota Way’s 4P model is based on Philosophy, Process, People & Partners, and Problem Solving.
Security practitioners are already familiar with people, processes and products triad which is similar to
4P principle. Let us see how these 4P principles can be applied to information security operations.
Philosophy
Principle 1-Long Term Philosophy: Articulate and evangelize mission and policy statement for
Cyber Security to ensure executive and operational staff are aware of fiduciary duties towards
company’s customers and employees. Develop KPI’s to measure security performance based on
parameters such as operational resilience achieved, return on security investments , people’s
awareness and compliance level achieved.
Investments in security should be strategic in nature considering ever changing threat
landscape, existing and emerging actors and effectiveness of existing defensive measures.
Security is never point-in-time solution. It needs strategic risk-based thought process rather than
quick fixes. Security should have mission statement to make customers and employees data
safe, protect organization’s intellectual property while transacting business, ensure their privacy
is maintained and ensure compliance.
Process
Principle 2-Create continuous process flow to bring problems to surface:
Create continuous process flow to bring problems to surface through two fold approach:
1) Integrating SIEM and vulnerability scanning tool with Service desk tool to generate
actionable tickets based on severity.
2) Ensuring monitoring team within SOC work closely with IT operations team to ensure that
configuration, patches, and false alarms are managed effectively. This would require
constant and ongoing communication between security operations and IT operations
Infosec practitioners can perform Value stream mapping by identifying repetitive operational
processes such as:
 Running vulnerability scans, evaluating it’s value based on risk posed, remediating through
patching, pushing secure configuration settings, loading predefined images, hardening and
reflecting on results.
 Tuning false positives thrown by intrusion prevention, advanced malware and breach
detection system to ensure that SOC (security operation center) operators and analyst are
not overwhelmed with alerts which do not add value.
Principle 3: Use “pull” system so as not to overwhelm staff by prioritizing tickets based on their
severity level. Similarly triage can performed by networking modelling and event enrichment in
SIEM tool for assets which might be target of attack and directing efforts to respond to it.
Principle 4: Levelling out workload. In infosec world 80% of vulnerabilities can be fixed with 20%
of efforts. These quick wins and low hanging fruits will help to level out workload (Heijunka) and
not stress the scarce security resources.
Principle 5: Building culture of stopping to fix problems to get quality right the first time.
During red team exercises create attack scenarios, identify devices which will generate logs,
alerts and notifications. Stop to fine tune IPS, anti-malware, advanced threat detection system
or co-relation rules within SIEM to ensure only impactful alerts and notification are generated.
This can go long way in continual improvement (kaizen).
Principle 6: Use standardized tasks: SOC tasks needs to be standardized through appropriate
operating manuals, minimum security baselines etc. which are based on applications, operating
and database systems. Use standards and framework like ISO 27001, CI Security and CoBIT.
Standardized tasks are the foundation for continuous improvement & employee empowerment.
Principle 7: Use visual controls so that no problems are hidden. Video walls with appropriate
dash boards and alerts identify events of interest and any action if it needs to be taken. White
boards can similarly be used for brain storming during incident investigation.
Dash boards with pie charts, bar charts, histogram, trending graphs and scatter diagram on
these video walls give visual view of events of interest, vulnerabilities and incidents. 5S
methodology could consist of Standardize, Scan, Sort, Straighten and Sustain
Principle 8: Use only reliable thoroughly tested technology that serves your people and
processes. Before adapting any security solution, understand skill level, organization culture and
its integration in current security processes. Decisions on implementing new and emerging
technologies versus mature and stable one needs to be thoroughly analyzed.
People & Partners
Principle 9 : Grow leaders who thoroughly understand the work, live the philosophy & teach it
to others.
Principle 10: Develop exceptional people & teams who follow your company’s philosophy.
Staff working in security operations should understand critical functions and services which they
are entrusted with to protect, articulate that mission and vision of cyber security. Leaders
should be groomed from exceptional staff within the infosec team. These leaders should
propagate the concept of managing risks, protecting customer data and privacy. Train staff on
regular basis to keep their motivational level high.
Principle 11: Respect your extended network of partners and suppliers by challenging them &
helping them improve. In cyber security, managed security services providers, partners,
suppliers and vendors play important role with timely patches and advisories. This eco system
needs to be developed and enhanced through constant communication, interaction, updates
and bug fix assistance from the vendors.
Problem Solving
Principle 12: Go and see for yourself to thoroughly understand the situation. CISOs, Infosec
managers and executive need to visit or teleconference with SOC (Security Operations Center)
Straighten & fix
technology or
processes
Sustain it by third
party reviews &
audits
Scan network
regularly, analyze
information &
events
Optimize efforts & time to reduce
& eliminate frivolous alerts
Standardize on
schedule &
methodology to
manage risks
Sort high impact
vulnerabilities
for outsourced or geographically dispersed locations on regular basis to review incidents and
overall operational performance.
Principle 13: Make decision slowly by consensus thoroughly considering all options &
implement decisions rapidly. Cyber strategy requires long term planning by on boarding all
business stake holders considering regulatory environment, changing business priorities, threat
scenarios, global and regional political scenarios. Get concurrence of all stakeholders on
identified risks, evaluate current technology and processes thoroughly with consensus before
implementing solutions
Principle 14: Become a learning organization through relentless reflection and continuous
improvement (kaizen). It is incumbent in ever changing cyber security field to continuously keep
learning lessons from past incidents, improve your defenses and further bolster security.
Edward Deming’s Plan-DO-Check-Act (PDCA) which Infosec professional are familiar with,
reiterates this principle.
Lean management principles can thus be applied to services industries like information security
operations to achieve greater cyber resilience and bolster the security.
*Reference-Toyota Way- 14 Management Principles by Jeffrey Liker
(The views expresses herein are author’s personal views & does not reflect the views of his
employers, their principals, affiliates or clients)

More Related Content

What's hot

Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays Worldgueste0d962
 
OpenStack Training | OpenStack Tutorial For Beginners | OpenStack Certificati...
OpenStack Training | OpenStack Tutorial For Beginners | OpenStack Certificati...OpenStack Training | OpenStack Tutorial For Beginners | OpenStack Certificati...
OpenStack Training | OpenStack Tutorial For Beginners | OpenStack Certificati...
Edureka!
 
Performance Of IT Infrastructure Author Liam Smith
Performance Of IT Infrastructure Author Liam SmithPerformance Of IT Infrastructure Author Liam Smith
Performance Of IT Infrastructure Author Liam Smith
Global Custom Packaging
 
IBM Spectrum Scale for File and Object Storage
IBM Spectrum Scale for File and Object StorageIBM Spectrum Scale for File and Object Storage
IBM Spectrum Scale for File and Object Storage
Tony Pearson
 
Microsoft Azure Cloud Services
Microsoft Azure Cloud ServicesMicrosoft Azure Cloud Services
Microsoft Azure Cloud Services
David J Rosenthal
 
The Internal Signs of Compromise
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of Compromise
FireEye, Inc.
 
VDI/ VMware Horizon View
VDI/ VMware Horizon ViewVDI/ VMware Horizon View
VDI/ VMware Horizon View
SumeraHangi
 
Estimating Development Security Maturity in About an Hour
Estimating Development Security Maturity in About an HourEstimating Development Security Maturity in About an Hour
Estimating Development Security Maturity in About an Hour
Priyanka Aash
 
High Availability in Microsoft Azure
High Availability in Microsoft AzureHigh Availability in Microsoft Azure
High Availability in Microsoft Azure
Krunal Trivedi
 
Introduction to storage
Introduction to storageIntroduction to storage
Introduction to storagesagaroceanic11
 
Microsoft Azure Cost Optimization and improve efficiency
Microsoft Azure Cost Optimization and improve efficiencyMicrosoft Azure Cost Optimization and improve efficiency
Microsoft Azure Cost Optimization and improve efficiency
Kushan Lahiru Perera
 
Patch Management Best Practices
Patch Management Best Practices Patch Management Best Practices
Patch Management Best Practices
Ivanti
 
Virtualization Explained | What Is Virtualization Technology? | Virtualizatio...
Virtualization Explained | What Is Virtualization Technology? | Virtualizatio...Virtualization Explained | What Is Virtualization Technology? | Virtualizatio...
Virtualization Explained | What Is Virtualization Technology? | Virtualizatio...
Simplilearn
 
Linux network file system (nfs)
Linux   network file system (nfs)Linux   network file system (nfs)
Linux network file system (nfs)Raghu nath
 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualization
hktripathy
 
VMware Cloud Foundation - PnP presentation 8_6_18 EN.pptx
VMware Cloud Foundation - PnP presentation 8_6_18 EN.pptxVMware Cloud Foundation - PnP presentation 8_6_18 EN.pptx
VMware Cloud Foundation - PnP presentation 8_6_18 EN.pptx
BradLai3
 
vSAN Beyond The Basics
vSAN Beyond The BasicsvSAN Beyond The Basics
vSAN Beyond The Basics
Sumit Lahiri
 

What's hot (20)

Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays World
 
OpenStack Training | OpenStack Tutorial For Beginners | OpenStack Certificati...
OpenStack Training | OpenStack Tutorial For Beginners | OpenStack Certificati...OpenStack Training | OpenStack Tutorial For Beginners | OpenStack Certificati...
OpenStack Training | OpenStack Tutorial For Beginners | OpenStack Certificati...
 
Xinja Bank: AWS Journey
Xinja Bank: AWS JourneyXinja Bank: AWS Journey
Xinja Bank: AWS Journey
 
Performance Of IT Infrastructure Author Liam Smith
Performance Of IT Infrastructure Author Liam SmithPerformance Of IT Infrastructure Author Liam Smith
Performance Of IT Infrastructure Author Liam Smith
 
IBM Spectrum Scale for File and Object Storage
IBM Spectrum Scale for File and Object StorageIBM Spectrum Scale for File and Object Storage
IBM Spectrum Scale for File and Object Storage
 
Microsoft Azure Cloud Services
Microsoft Azure Cloud ServicesMicrosoft Azure Cloud Services
Microsoft Azure Cloud Services
 
The Internal Signs of Compromise
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of Compromise
 
VDI/ VMware Horizon View
VDI/ VMware Horizon ViewVDI/ VMware Horizon View
VDI/ VMware Horizon View
 
Estimating Development Security Maturity in About an Hour
Estimating Development Security Maturity in About an HourEstimating Development Security Maturity in About an Hour
Estimating Development Security Maturity in About an Hour
 
High Availability in Microsoft Azure
High Availability in Microsoft AzureHigh Availability in Microsoft Azure
High Availability in Microsoft Azure
 
Introduction to storage
Introduction to storageIntroduction to storage
Introduction to storage
 
Cohesity-One-Pager
Cohesity-One-PagerCohesity-One-Pager
Cohesity-One-Pager
 
Microsoft Azure Cost Optimization and improve efficiency
Microsoft Azure Cost Optimization and improve efficiencyMicrosoft Azure Cost Optimization and improve efficiency
Microsoft Azure Cost Optimization and improve efficiency
 
Patch Management Best Practices
Patch Management Best Practices Patch Management Best Practices
Patch Management Best Practices
 
Virtualization Explained | What Is Virtualization Technology? | Virtualizatio...
Virtualization Explained | What Is Virtualization Technology? | Virtualizatio...Virtualization Explained | What Is Virtualization Technology? | Virtualizatio...
Virtualization Explained | What Is Virtualization Technology? | Virtualizatio...
 
Linux network file system (nfs)
Linux   network file system (nfs)Linux   network file system (nfs)
Linux network file system (nfs)
 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualization
 
VMware Cloud Foundation - PnP presentation 8_6_18 EN.pptx
VMware Cloud Foundation - PnP presentation 8_6_18 EN.pptxVMware Cloud Foundation - PnP presentation 8_6_18 EN.pptx
VMware Cloud Foundation - PnP presentation 8_6_18 EN.pptx
 
vSAN Beyond The Basics
vSAN Beyond The BasicsvSAN Beyond The Basics
vSAN Beyond The Basics
 
Xen Hypervisor
Xen HypervisorXen Hypervisor
Xen Hypervisor
 

Viewers also liked

Introduction to malware analysis with Cuckoo Sandbox
Introduction to malware analysis with Cuckoo SandboxIntroduction to malware analysis with Cuckoo Sandbox
Introduction to malware analysis with Cuckoo Sandbox
sysinsider
 
Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.
360factors
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
Imperva
 
5s Audit Checklist
5s Audit Checklist5s Audit Checklist
5s Audit Checklist
Ben Geck
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari
 
Investigation de cybersécurité avec Splunk
Investigation de cybersécurité avec SplunkInvestigation de cybersécurité avec Splunk
Investigation de cybersécurité avec Splunk
Ibrahimous
 
Cyber security
Cyber securityCyber security
Cyber security
Siblu28
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Viewers also liked (8)

Introduction to malware analysis with Cuckoo Sandbox
Introduction to malware analysis with Cuckoo SandboxIntroduction to malware analysis with Cuckoo Sandbox
Introduction to malware analysis with Cuckoo Sandbox
 
Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
5s Audit Checklist
5s Audit Checklist5s Audit Checklist
5s Audit Checklist
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Investigation de cybersécurité avec Splunk
Investigation de cybersécurité avec SplunkInvestigation de cybersécurité avec Splunk
Investigation de cybersécurité avec Splunk
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Applying Lean for information security operations centre

Ciso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal itCiso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal it
Chandra Sekhar Tondepu
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
Fahmi Albaheth
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji JacobBeji Jacob
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
INTERNAL Assign no   207( JAIPUR NATIONAL UNI)INTERNAL Assign no   207( JAIPUR NATIONAL UNI)
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
Partha_bappa
 
Embarking on Your ServiceNow SecOps Journey: A Secure and Efficient Path
Embarking on Your ServiceNow SecOps Journey: A Secure and Efficient PathEmbarking on Your ServiceNow SecOps Journey: A Secure and Efficient Path
Embarking on Your ServiceNow SecOps Journey: A Secure and Efficient Path
Aelum Consulting
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValue
RapidValue
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
Sirius
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
sdfghj21
 
Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture
Ajay Kumar Uppal
 
Many products-no-security (1)
Many products-no-security (1)Many products-no-security (1)
Many products-no-security (1)
SecPod Technologies
 
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldKey Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
TEWMAGAZINE
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
Infosectrain3
 
Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020
Manuel Guillen
 
Innovation connections quick guide managing ict risk for business pdf
Innovation connections quick guide managing ict risk for business pdfInnovation connections quick guide managing ict risk for business pdf
Innovation connections quick guide managing ict risk for business pdf
Abdulbasit Almauly
 
Enterprise Architecture - Information Security
Enterprise Architecture - Information SecurityEnterprise Architecture - Information Security
Enterprise Architecture - Information Security
Ajay Kumar Uppal
 
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
yoroflowproduct
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
William McBorrough
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
William McBorrough
 

Similar to Applying Lean for information security operations centre (20)

Ciso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal itCiso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal it
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacob
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
INTERNAL Assign no   207( JAIPUR NATIONAL UNI)INTERNAL Assign no   207( JAIPUR NATIONAL UNI)
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
 
Embarking on Your ServiceNow SecOps Journey: A Secure and Efficient Path
Embarking on Your ServiceNow SecOps Journey: A Secure and Efficient PathEmbarking on Your ServiceNow SecOps Journey: A Secure and Efficient Path
Embarking on Your ServiceNow SecOps Journey: A Secure and Efficient Path
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValue
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture Business value of Enterprise Security Architecture
Business value of Enterprise Security Architecture
 
Many products-no-security (1)
Many products-no-security (1)Many products-no-security (1)
Many products-no-security (1)
 
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldKey Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
 
Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020
 
S Rod Simpson Resume
S Rod Simpson ResumeS Rod Simpson Resume
S Rod Simpson Resume
 
Innovation connections quick guide managing ict risk for business pdf
Innovation connections quick guide managing ict risk for business pdfInnovation connections quick guide managing ict risk for business pdf
Innovation connections quick guide managing ict risk for business pdf
 
Enterprise Architecture - Information Security
Enterprise Architecture - Information SecurityEnterprise Architecture - Information Security
Enterprise Architecture - Information Security
 
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

Applying Lean for information security operations centre

  • 1. Applying Lean Methodology for Cyber Security Management* . Over the years manufacturing industries have adopted TQM (Total Quality Management) systems such as Lean and 6 Sigma with great deal of success. In recent times, these systems have been implemented in service industries with varying degree of success. Lean or Toyota Way as it has come to be known, has its roots in Toyota Production System (TPS ) which can adopted for cyber security operations by applying same principles. Toyota Way’s 4P model is based on Philosophy, Process, People & Partners, and Problem Solving. Security practitioners are already familiar with people, processes and products triad which is similar to 4P principle. Let us see how these 4P principles can be applied to information security operations. Philosophy Principle 1-Long Term Philosophy: Articulate and evangelize mission and policy statement for Cyber Security to ensure executive and operational staff are aware of fiduciary duties towards
  • 2. company’s customers and employees. Develop KPI’s to measure security performance based on parameters such as operational resilience achieved, return on security investments , people’s awareness and compliance level achieved. Investments in security should be strategic in nature considering ever changing threat landscape, existing and emerging actors and effectiveness of existing defensive measures. Security is never point-in-time solution. It needs strategic risk-based thought process rather than quick fixes. Security should have mission statement to make customers and employees data safe, protect organization’s intellectual property while transacting business, ensure their privacy is maintained and ensure compliance. Process Principle 2-Create continuous process flow to bring problems to surface: Create continuous process flow to bring problems to surface through two fold approach: 1) Integrating SIEM and vulnerability scanning tool with Service desk tool to generate actionable tickets based on severity. 2) Ensuring monitoring team within SOC work closely with IT operations team to ensure that configuration, patches, and false alarms are managed effectively. This would require constant and ongoing communication between security operations and IT operations Infosec practitioners can perform Value stream mapping by identifying repetitive operational processes such as:  Running vulnerability scans, evaluating it’s value based on risk posed, remediating through patching, pushing secure configuration settings, loading predefined images, hardening and reflecting on results.  Tuning false positives thrown by intrusion prevention, advanced malware and breach detection system to ensure that SOC (security operation center) operators and analyst are not overwhelmed with alerts which do not add value. Principle 3: Use “pull” system so as not to overwhelm staff by prioritizing tickets based on their severity level. Similarly triage can performed by networking modelling and event enrichment in SIEM tool for assets which might be target of attack and directing efforts to respond to it. Principle 4: Levelling out workload. In infosec world 80% of vulnerabilities can be fixed with 20% of efforts. These quick wins and low hanging fruits will help to level out workload (Heijunka) and not stress the scarce security resources. Principle 5: Building culture of stopping to fix problems to get quality right the first time. During red team exercises create attack scenarios, identify devices which will generate logs, alerts and notifications. Stop to fine tune IPS, anti-malware, advanced threat detection system or co-relation rules within SIEM to ensure only impactful alerts and notification are generated. This can go long way in continual improvement (kaizen). Principle 6: Use standardized tasks: SOC tasks needs to be standardized through appropriate operating manuals, minimum security baselines etc. which are based on applications, operating and database systems. Use standards and framework like ISO 27001, CI Security and CoBIT. Standardized tasks are the foundation for continuous improvement & employee empowerment. Principle 7: Use visual controls so that no problems are hidden. Video walls with appropriate dash boards and alerts identify events of interest and any action if it needs to be taken. White boards can similarly be used for brain storming during incident investigation.
  • 3. Dash boards with pie charts, bar charts, histogram, trending graphs and scatter diagram on these video walls give visual view of events of interest, vulnerabilities and incidents. 5S methodology could consist of Standardize, Scan, Sort, Straighten and Sustain Principle 8: Use only reliable thoroughly tested technology that serves your people and processes. Before adapting any security solution, understand skill level, organization culture and its integration in current security processes. Decisions on implementing new and emerging technologies versus mature and stable one needs to be thoroughly analyzed. People & Partners Principle 9 : Grow leaders who thoroughly understand the work, live the philosophy & teach it to others. Principle 10: Develop exceptional people & teams who follow your company’s philosophy. Staff working in security operations should understand critical functions and services which they are entrusted with to protect, articulate that mission and vision of cyber security. Leaders should be groomed from exceptional staff within the infosec team. These leaders should propagate the concept of managing risks, protecting customer data and privacy. Train staff on regular basis to keep their motivational level high. Principle 11: Respect your extended network of partners and suppliers by challenging them & helping them improve. In cyber security, managed security services providers, partners, suppliers and vendors play important role with timely patches and advisories. This eco system needs to be developed and enhanced through constant communication, interaction, updates and bug fix assistance from the vendors. Problem Solving Principle 12: Go and see for yourself to thoroughly understand the situation. CISOs, Infosec managers and executive need to visit or teleconference with SOC (Security Operations Center) Straighten & fix technology or processes Sustain it by third party reviews & audits Scan network regularly, analyze information & events Optimize efforts & time to reduce & eliminate frivolous alerts Standardize on schedule & methodology to manage risks Sort high impact vulnerabilities
  • 4. for outsourced or geographically dispersed locations on regular basis to review incidents and overall operational performance. Principle 13: Make decision slowly by consensus thoroughly considering all options & implement decisions rapidly. Cyber strategy requires long term planning by on boarding all business stake holders considering regulatory environment, changing business priorities, threat scenarios, global and regional political scenarios. Get concurrence of all stakeholders on identified risks, evaluate current technology and processes thoroughly with consensus before implementing solutions Principle 14: Become a learning organization through relentless reflection and continuous improvement (kaizen). It is incumbent in ever changing cyber security field to continuously keep learning lessons from past incidents, improve your defenses and further bolster security. Edward Deming’s Plan-DO-Check-Act (PDCA) which Infosec professional are familiar with, reiterates this principle. Lean management principles can thus be applied to services industries like information security operations to achieve greater cyber resilience and bolster the security. *Reference-Toyota Way- 14 Management Principles by Jeffrey Liker (The views expresses herein are author’s personal views & does not reflect the views of his employers, their principals, affiliates or clients)