HomeCII/OTMitigating Security Risks in Low-Code/No-Code Environments - Help Net Security

Mitigating Security Risks in Low-Code/No-Code Environments – Help Net Security

Published on

spot_img

Continuous Threat Exposure Management (CTEM) is a groundbreaking concept introduced by Gartner that revolutionizes how organizations monitor cybersecurity threats. Unlike traditional methods that involve intermittent assessments, CTEM is a five-stage framework that allows for continuous monitoring and management of security threats. This approach, encompassing scoping, discovery, prioritization, validation, and mobilization, enables organizations to stay ahead of potential risks and integrate risk management into daily operations.

One area that is particularly vulnerable to cyber threats is software developed in low-code/no-code (LCNC) and robotic process automation (RPA) environments. These platforms, with their user-friendly interfaces powered by generative AI, have made it easier for “citizen developers” within organizations to create and deploy apps and RPAs. However, this trend, known as “shadow engineering,” poses a significant challenge to cybersecurity efforts as it allows for the unchecked introduction of potentially harmful vulnerabilities into the network.

As CIOs increasingly embrace LCNC technology, the need for a structured approach to managing security risks associated with these platforms becomes even more critical. By bringing LCNC apps and RPAs under the CTEM framework, organizations can identify vulnerabilities, assess potential attack vectors, prioritize remediation efforts, and validate security measures effectively.

The five-stage CTEM approach can be aligned with LCNCs and RPAs as follows:

1. Scoping: Begin by evaluating the business criticality of LCNC and RPA assets to determine which ones should be managed under CTEM. This may involve categorizing assets based on business context, platform environment, or geographical location.

2. Discovery: Catalog and discover visible and hidden vulnerabilities, assets, and misconfigurations associated with LCNC applications and automation. Lack of visibility into these platforms can make it challenging to maintain an updated inventory of all assets.

3. Prioritization: Assess the urgency, severity, available controls, and risk level of security exposures in LCNC environments. Combine traditional risk-based scores with platform-specific inputs to prioritize remediation efforts effectively.

4. Validation: Confirm the exploitability of known vulnerabilities, assess the worst-case impact of security failures, and establish processes to respond to security issues. Tailor validation techniques for LCNC applications to address specific challenges unique to these platforms.

5. Mobilization: Engage business users and citizen developers in the security process, as security teams alone may not have the expertise to handle all issues. Provide clear context, threat explanations, and remediation steps to stakeholders.

To effectively integrate LCNC and RPA security into the CTEM framework, organizations should focus on best practices such as integrating security measures into existing workflows, enhancing visibility into deployments, prioritizing high-risk assets, continuously adapting to new threats, and fostering collaboration across teams. By following these guidelines, CISOs can effectively manage the security risks associated with LCNC apps and RPAs under a continuous CTEM program that ensures a proactive and integrated cybersecurity approach.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...