Podbean logo
  • Discover
  • Podcast Features

    Your all-in-one podcasting solution.

    Podcast Studio

    Easy-to-use audio recorder app.

  • Livestream

    High-performing audio live, without limits.

  • Podcast App

    The best podcast player & podcast app.

  • Ads Marketplace

    Join Ads Marketplace to earn money
    through sponsorship on your podcast.

    PodAds

    Manage your ads with dynamic ad insertion capability.

  • Patron & Paid Content

    The seamless way for fans to support you directly
    from your podcast.

  • Apple Podcasts Subscriptions Integration

    Effortlessly publish and manage exclusive episodes for your
    Apple Podcasts subscribers directly from Podbean.

  • All Arts Business Comedy Education
  • Fiction Government Health & Fitness History Kids & Family
  • Leisure Music News Religion & Spirituality Science
  • Society & Culture Sports Technology True Crime TV & Film
  • Live
  • How to Start a Podcast
  • How to Start a Live Podcast
  • How to Monetize a podcast
  • How to Promote Your Podcast
  • How to Use Group Recording
  • Log in
  • Start your podcast for free
  • Podcasting
    • Podcast Features
    • Live Stream
    • PodAds
    • Podcast App
    • Podcast Studio
  • Monetization
    • Premium
    • Patron
    • Apple Podcasts Subscriptions Integration
    • Ads Marketplace
  • Enterprise
  • Pricing
  • Discover
  • Log in
    Sign up free
Quality Plus Consulting - Breakfast Bytes

Quality Plus Consulting - Breakfast Bytes

Technology

Requirements for premise hosted assets; cybersecurity, BCDR, and more

Requirements for premise hosted assets; cybersecurity, BCDR, and more

2022-07-01
Download

You should not put things in the cloud unless you can secure them there at least as good as a highly competent professional would have if they had that asset on premise.

Cloud hosted assets have additional risks.

  • Counterparty risk
  • Additional outage and accessibility risk
  • You have less control
  • You have less security over the human or governmental access to your content
  • Zero 4th Amendment protections over that data. It's fully subject to FISA searches that the provider is required to never tell you about.

Also do NOT get sucked into the scam that cloud hosting servers is more secure than if you did them on premise or somehow more cost effective. That is sheer lunacy.

SaaS can be more cost effective and more secure. Look at Office 365 as an example. That is clearly more secure, more cost effective, and more value than a premise Exchange server. SalesForce could be better for you than running your own CRM, but then you are also fully open to their crazy policies which could rip the rug out from under one of your most business critical systems.

There is no one right answer 100% of the time. Context and artistry of security strategy are exceedingly important.

This show is about these things as well as what you must have in place to have premise hosted secure assets. I describe a Tier0 asset scenario in specific and what can easily undermine it.

 

Premise hosted password managers

It is worth noting that extremely high functionality privileged access management and identity management systems are available in a premise hosted format which are a perpetual licensing model with very low annual software maintenance fees. These systems are exceptionally valuable to IT departments and QPC has extensive experience in these platforms. They are an exceptional value to IT management functions and IT departments.

However, most organizations, even those with full-time IT departments, will not meet the requirements for self-hosting. Why? In order for a self-hosted password management system to be successful, it relies upon many factors which must be in place and be fully executed with extremely high levels of skill and security. This level of skill is outside of the technical skill level of nearly all IT departments of companies with less than 5000 employees.

If the requirements are not fully met continually for the life of use of the platform, the platform and its contents are likely to be compromised. A compromise could consist of the data exfiltration of the entire password vault database which would be catastrophic to the organization.

Baseline requirements for premise password managers
  • Extremely tight supply chain risk network layer security rules and management
  • Ability to do offline upgrades for all software and systems involved
  • Extremely adept underlying server, network, power infrastructure management
  • Rapid patch management within 48 hours or less
  • Always on scanning for vulnerability assessment backed by active monitoring and remediation
  • Active monitoring
  • Multiple first line backups per day with multiple encrypted offsite backups per day
  • Two physically disparate sites with significant server, network, power infrastructure with automatic backup generator service and redundant internet
  • Proficiency at managing SQL server replication over WAN links in an active/active SQL server configuration
  • Proficiency at maintaining active/active application server configurations and automatic failover network configurations
  • Absolute rigorous discipline to adhere to documented standards for vault creation, password management system administration, application updates, database system updates, OS updates, third party app updates, network layer security management across the entire internal and site-to-site connected networks
    Any laxity in the discipline of the IT personnel managing the system will cause it to fail to deliver the security profile required for critical assets.
  • Minimum of two servers involved with the addition of more servers if internet facing roles such as mobile access are desired
  • IT personnel’s ability to implement and maintain complex privileged access management systems
  • Regular security compliance and audit report reviews. This will require a CISO and/or compliance officer with significant technical skill.
view more

More Episodes

How a lack of understanding of business processes relates to adverse financial impact
2023-09-01 37
Email security management and monitoring is critical
2023-08-04 55
CISO, CTO, CIO, what’s the difference?
2023-06-16 79
Zero trust fundamentals
2023-06-02 96
FTC SafeguardsRule, IRS requirements, and tax preparers
2023-05-05 105
Methods to prevent business email compromise
2023-03-31 91
Business survival over the next decade
2023-03-03 84
PSA or ERP - paradigm and requirements analysis
2023-02-19 207
Tech E&O and cyber insurance with Joe Brunsman
2023-02-09 84
Implications of poor design on security - an example
2023-02-03 83
Dark web monitoring and avoiding FUD decisions
2023-01-11 99
The relationship between proper data handling and real risk reduction
2023-01-04 66
Understanding vCISO services and why you need them
2022-11-30 79
What you must do in order to prepare for a breach
2022-11-19 183
Information Security, Cybersecurity, and Everyone’s Responsibility
2022-10-28 81
Ripping apart cybersecurity insurance
2022-10-12 133
CISO Workflows
2022-09-30 100
Business Email Compromise
2022-09-29 59
Vulnerability management with Felicia and Dan - Part 2
2022-09-21 69
File integrity checks (hashing) versus communications or data encryption
2022-09-21 65
  • ←
  • 1
  • 2
  • 3
  • 4
  • →
012345678910111213141516171819

Get this podcast on your
phone, FREE

Download Podbean app on App Store Download Podbean app on Google Play

Create your
podcast in
minutes

  • Full-featured podcast site
  • Unlimited storage and bandwidth
  • Comprehensive podcast stats
  • Distribute to Apple Podcasts, Spotify, and more
  • Make money with your podcast
Get started

It is Free

  • Podcast Services

    • Podcast Features
    • Pricing
    • Enterprise Solution
    • Private Podcast
    • The Podcast App
    • Live Stream
    • Audio Recorder
    • Remote Recording
  •  
    • Create a Podcast
    • Video Podcast
    • Start Podcasting
    • Start Radio Talk Show
    • Education Podcast
    • Church Podcast
    • Nonprofit Podcast
    • Get Sermons Online
    • Free Audiobooks
  • MONETIZATION & MORE

    • Podcast Advertising
    • Dynamic Ads Insertion
    • Patron Program
    • Apple Podcasts Subscriptions
    • Switch to Podbean
    • Submit Your Podcast
    • Podbean Plugins
    • Developers
  • KNOWLEDGE BASE

    • How to Start a Podcast
    • How to Start a Live Podcast
    • How to Monetize a podcast
    • How to Promote Your Podcast
    • How to Use Group Recording
  • Support

    • Support Center
    • What’s New
    • Free Webinars
    • Podcast Events
    • Podbean Academy
    • Podcasting Smarter
    • Badges
    • Resources
  • Podbean

    • About Us
    • Podbean Blog
    • Careers
    • Press and Media
    • Green Initiative
    • Affiliate Program
    • Contact Us
  • Privacy Policy
  • Cookie Policy
  • Terms of Use
  • Consent Preferences
  • Copyright © 2015-2023 Podbean.com