A Modern Definition for Cyber Assets

by

Cloud adoption, digital transformation, and API-first architecture are fundamentally changing how we build, manage and secure the enterprise. Enterprises use specialized infrastructure and security tools each of which has its own definition of asset. Understanding your entire cyber asset landscape is nearly impossible due to the breadth of technologies in play and the multiple definitions of assets introduced by each tool

As the industry continues to move towards a model of cloud-native architecture, our definition of what is defined as a "cyber asset" needs to be part of that transformation. IT assets are proliferating beyond devices and increasing in both scale and complexity. Companies are discovering they have unknowingly created "shadow asset classes" within their organizations. Along with these shadow assets comes the added complexity of understanding and managing the shadow relationships and dependencies among those assets.

Disconnected, inaccurate cyber asset inventory systems inadvertently hide the context of how assets interoperate, giving attackers the advantage to exploit the attack vectors that lurk in the shadows. It is no longer enough to know what your assets are, your system must automatically identify how they relate to each other. Where it used to be simple, businesses must now reinvent how they track, monitor, and govern a new cyber asset collection and the shadow relationships unintentionally created by those assets.

Towards a modern definition of cyber assets

A modern definition of cyber assets begins with any asset that can be software defined. Everything from identities to cloud configurations and repositories fall under this category. Limiting assets to those things that are only addressable by IP severely limits the depth of understanding that can be built with interconnected relationship models.

An interesting part of the transformation to a modern definition of cyber assets recognizes that assets are software defined and ephemeral. Cyber assets in a modern definition do not persist, nor do the relationships created between them. If designed properly the assets and relationships are created and torn down automatically as scale dictates.

In a modern definition of cyber assets, highly complex relationships connect people, process, and technology, and are integral to the definition. It isn't the assets themselves that are solely defined. The definition of modern cyber assets includes the relationship to every other asset in the collection. This is a critical distinction between existing definitions and a modern definition which views the entire system as an interconnected whole.

How to utilize the modern definition of cyber assets

How are we to build a modern, secure system with this new understanding of cyber assets? There are four categories that will help companies take advantage of our modern definition of cyber assets.

Discover all of your software-defined assets.

Gain and maintain complete visibility to all of your cyber assets, not just those IP related ones. As you choose tools to give you that visibility, work with a consistent definition of cyber assets to build a unified asset inventory and management solution.

Understand your assets through contextual relationships.

Understanding the relationships between your cyber assets is as important as knowing what and where those assets are. Choose solutions that put the relationships and impact of those connections into context, as part of a broader security and IT strategy. Gain deep context via visual graphs and mapping the relationships across your entire infrastructure.

Monitor your asset compliance through automated security enforcement.

In order to create a highly functioning security program, modern organizations automate the discovery and management of cyber assets while aligning the data with their security policies. This reduces complexity by automating security policy enforcement and avoiding compliance drift. 

Proactively act through continuous governance and security programs.

Be proactive. Automate the collection of cyber asset data, analyze and alert on issues, and integrate these results with optimized workflows. Realize that with the ephemeral nature of modern cyber assets, your system must be automated and malleable in order to track and monitor your assets.

Defining cyber assets means better security

We as an industry need to agree there is a better way to build security into our systems through an updated understanding of the complexity of the relationships between our cyber assets and how to better manage them. We can start with agreeing to a modern definition of cyber assets, including the relationships that produce hidden consequences, shadow relationships, that create unintended trust within our systems.

Is you enjoyed this article, please join us on July 29, 2021 at 1:00 PM for a live podcast/webinar with Chris Roberts and Mark Miller, CYA - Cover Your Assets for Simplified Security.

 

Modern Visibility in Cyberseccurity
Mark Miller
Mark Miller

Mark Miller speaks and writes extensively on DevSecOps and Cybersecurity. He has published 9 books, including "Modern Cybersecurity: Tales from the Near-Distant Future"

Keep Reading

Why Your Business Needs Cloud Asset Management
April 10, 2024
Blog
Why Your Business Needs Cloud Asset Management

Organizations are transitioning to the cloud faster than ever to keep up with the changing consumer and business climate. According to Gartner, by 2023, 40% of all

‘Type and go’ - New JupiterOne search bar enhancements
October 30, 2023
Blog
‘Type and go’ - New JupiterOne search bar enhancements

JupiterOne aggregates and normalizes data from hundreds of different sources so you can identify and triage security risks easily.

Identify and eliminate endpoint device security gaps using the new JupiterOne Unified Device Matrix
October 6, 2023
Blog
Identify and eliminate endpoint device security gaps using the new JupiterOne Unified Device Matrix

It seems like a simple question. “Are any of our deployed user endpoint devices missing an endpoint detection and response agent?”

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.