Automation helping in rapid evolution and change in functionality


By MYBRANDBOOK


Automation helping in rapid evolution and change in functionality

Dhananjay Rokde, CISO & CDPO, iManEdge

 

Technology blueprint for year ahead
In the age of CI-CD (Continuous Integration & Continuous Development); Rapid-Secure-Change Management and Dynamic Incident Response have become a MUST. Integrating SecDevOps into the traditional DevOps Model has become the new norm. With automated builds being delivered in real-time – continuous testing and security automation are required to support the high-speed business environment.

 

My take on the overall focus of 2023-2024 would be three things –
· Agile delivery through SecDevOps
· High levels of resiliency by lower the MTBF (Mena Time Between Failures) & MTTR (Mean Time to Recover/ Restore) rates
· Zero-Trust-Network-Architecture (ZTNA)


Through extensive automation we are also looking at cost-cutting across all the manual touchpoints with the STP (Straight Through Processing) cycle. We are asking ourselves – “Why can’t a machine / program do this task?” across the ecosystem, and reducing manual hand-offs wherever possible.

 

Latest technologies influencing growth
We are currently in the process of implementing cutting-edge technologies such as AIOps and MLOps on dynamic containers and IaC (Infrastructure as Code) for rapid deployment.

CI-CD pipelines are being automated using containers (running on severless platforms) to dynamically roll out micro-builds and even tear down unrequired features or environments.


ZTNA across all services and preparation for every type of contingency (with adequate fail-safes) are being tested and implemented. We are applying the “Fail Fast” principles across the environment.

 

Fortifying organization from cyber threats
The attack surfaces have drastically increased. Servers, devices and API weaknesses are no longer hot targets. “Data, and specifically Personally Identifiable Information (PII), and Financially Sensitive Information (FSI) have become HOT targets”. It has become critical to not protect the employee base, but the customer end users as well. The weakest link breaks the chain – hence, continuous education and training are imperative for survival, along with monitoring and control.

While newer technologies are addressing the speed parameter of things – Security is clearly taking a back seat. Layer 7 Protection (of mission-critical assets) is vital. Access is enforced via ZTNA, coupled with MFA (Multi Factor Authentication) to reduce the risk of unauthorised access. PIdM (Privileged Identity Management) is further enforced to reduce the risk of over-privilege and authorization abuse.

 E-Magazine 
 VIDEOS  Placeholder image

Copyright www.mybrandbook.co.in @1999-2024 - All rights reserved.
Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.
Other Initiatives : www.varindia.com | www.spoindia.org