MSSPs Part 2: Reasons to be wary
Seven shortfalls of outsourcing security
Computerworld - In my previous article, I talked about 10 reasons why outsourcing to managed security service providers (MSSP) may be a cheaper and better way for companies to implement part of their security infrastructures. However, as with everything, where there are pros, there are always cons.
Here are some reasons why you should think twice before outsourcing.
1. Infrastructure control
Once you outsource your security infrastructure, such as firewalls and intrusion-detection systems, you may lose some or all control over it. Many MSSPs want to retain full control in order to reduce the finger-pointing when a catastrophe happens.
Also, MSSPs usually have the tools to manage security on the network, and they'll do it differently than your in-house administrators would, so shared control can create problems when both sides can't agree on certain issues. However, you still have control over system policies. If you can't swallow the fact that you will lose control, look for an MSSP that will share access with you.
2. Security policy
Any good security policy requires knowledge on the company's corporate culture and business. The MSSP won't know everything about your company. For example, it won't know that your company's extranet can only be accessed by specific strategic partners. Nor will it know that only specific administrators can access security data and that these people must have access at any time. It's your responsibility to work with the MSSP to make sure that it understands and builds your security policy. Some MSSPs can provide professional services to help you, but you will have to pay more.
3. Security environment
Unless the MSSP handles all of your infrastructure, it won't know all of the applications and servers you have. That means it's difficult for the vendor to accurately determine whether a security event is critical or just a false alarm, because it has insufficient information. Most MSSPs can work with you to set up an escalation policy that includes partial knowledge of your environment, including information on the applications and servers in your infrastructure. However, it's up to you to keep that information current and to update the MSSP as necessary.
4. Administrative access
One of the biggest surprises for companies considering outsourcing their information security is that most MSSPs have a team of engineers and they all have administrative access to the client company's systems. The team size can sometimes be as many as 30 engineers.
In contrast, most companies probably have only two or three administrators who are allowed to manage systems. To mitigate the risk of having too many people who can make modifications, work
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts