<p>Many IT automation and orchestration discussions focus on using pipelines that enable continuous integration/continuous delivery to improve IT productivity and efficiency. While these pipelines benefit service and software development, they can also bolster an organization’s security posture.</p>
<p>It’s helpful to frame security automation discussions by using the <a href=”https://www.techtarget.com/whatis/definition/Confidentiality-integrity-and-availability-CIA”>CIA triad</a>. The triad consists of the following three aspects:</p>
<ul class=”default-list”>
<li><b>Confidentiality.</b> Enforcing resource access to only authorized users.</li>
<li><b>Integrity.</b> Ensuring data does not unexpectedly change.</li>
<li><b>Availability.</b> Guaranteeing services, applications and data are available to authorized users.</li>
</ul>
<p>The CIA triad <a target=”_blank” href=”https://www.nccoe.nist.gov/publication/1800-26/VolA/index.html” rel=”noopener”>provides context</a> to security discussions. It’s helpful for cybersecurity planning, practices and maintenance. In this case, it helps demonstrate how security automation benefits organizations.</p>
<section class=”section main-article-chapter” data-menu-title=”Challenges of manual intervention”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>Challenges of manual intervention</h2>
<p>Let’s begin with the challenges inherent in manual IT security configuration and monitoring.</p>
<p>Modern IT infrastructures are typically too large, too diverse and too distributed to permit efficient and effective manual management. Today’s environments include on-premises physical and virtual devices running Linux and Windows, as well as <a href=”https://www.techtarget.com/searchcloudcomputing/tip/Hybrid-cloud-security-challenges-and-how-to-manage-them”>hybrid and multi-cloud deployments</a> across Amazon, Microsoft and Google platforms. While these placements offer significant benefits in scalability, cost-effectiveness and security, they also introduce a level of complexity that prohibits manual security processes.</p>
<p>Consider the following challenges of manual security management:</p>
<ul class=”default-list”>
<li>Human error due to overlooked settings, unf
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: