to model the provisioning of access
across a new network perimeter
between the two organisations can help
alleviate this problem and minimise the
chance of a cyberattack.
Where are the risks?
Enterprise IT networks can be vast.
So, as networks get divided, it can be
extremely problematic to understand
where the new network perimeters
exist. This challenge is compounded
by the fact that access points between
the two entities are still likely to exist
www.intelligentciso.com
|
Issue 07
In addition to the IT
network, the security
teams responsible
for keeping the
attack surface
protected must also
be split.
beyond the divestment process. Only
by employing a solution that provides
visibility of the entire network can the
businesses identify where the new
network perimeter is situated, where or
how connectivity should be removed and
what levels of security and connectivity
are needed or not.
There is also a possibility that a breach
could cross over from one organisation
to the other. The solution to this is to
enable security teams to fully understand
the expected impact and path of an
attack and whether the most appropriate
73