How long does it take to establish a security concept?

 Steinkühler:It took two years for Ernst & Young to certify their architecture and the process is ongoing. We had 51 findings in the first attack during a penetration test at Ernst & Young. Of course, we tried to fix them, but after the 13th finding, there was no possible solution, because there were simply too many gaps that could not be closed. We had to accept that there were too many systems in use that were not secure against penetration. Therefore, we completely remodeled the architecture; the simple explanation is that we have built a high wall with encryption and a network controller that also works as a firewall and control point: all websites that may contain links to the outside are re-examined and protected. Our security architecture is like a fort: only a few gates open,


»OUR SECURITY ARCHITECTURE IS LIKE A FORT: ONLY A FEW GATES OPEN. «

Bernd Steinkühler


Correct Power Institute


You have as clients companies from various sectors. Is there a security solution that can be used as a model for all the others?


Bernd Steinkühler: It must always be checked individually. Ultimately, the correct concept must be based on how the data leaves the computational center. The various possibilities must be incorporated in collaboration with the client's security department. In addition, several standards and norms apply. Basic BSI protection is considered the bible of cybersecurity. When taken into account, at least one elementary level of protection has been obtained. The rest must be adapted to individual requirements.


You have as clients companies from various sectors. Is there a security solution that can be used as a model for all the others?

Technicians are well-versed with the brass tacks of the services/products, which they provide support for. If IT Technicians are unable to resolve a problem, it is escalated to the senior team.

Bernd Steinkühler: It must always be checked individually. Ultimately, the correct concept must be based on how the data leaves the computational center. The various possibilities must be incorporated in collaboration with the client's security department. In addition, several standards and norms apply. Basic BSI protection is considered the bible of cybersecurity. When taken into account, at least one elementary level of protection has been obtained. The rest must be adapted to individual requirements.


Comments

Popular posts from this blog

Discover how to leverage your IT career

What is a DDoS Attack? A Simple Definition

How to prevent a DDoS?