Running our most recent European user group with customers here at Illumio - we struck upon the theme of crown jewel applications: critical applications, environments - systems that hold the most critical data to an organisation; or pose the most risk should they be inadvertently accessed or compromised.
Using this theme, we chose the Tower of London as the venue - clear parallels being drawn between the most critical data assets an organisation possesses; and the historical significance and symbolism the actual crown jewels represent.
As Katey covers in her article - the key development is a movement from traditional perimeter protection methods; to a more pragmatic approach of ring-fencing high-value assets from other applications and vectors both externally and inside your network.
Beyond the immediate benefits of greatly-enhanced security, there are specific metrics on associated cost-savings that segmenting in this way provides:
Even beyond the benefits of securing crown jewel assets, there are hard dollar savings to stopping the spread of breaches anywhere on the network. In the 2018 Ponemon Institute report sample, companies that contained a breach in fewer than 30 days saved over $1 million compared to those that took more than 30 days.
So how do we build a plan to protect your crown jewels applications? We need to consider these points:
- How do you value your crown jewel applications?
- What is the cost of status quo security and the benefit of a new way?
- Which stakeholders should you bring to the table?
- What solution is right for you?
- How can you ensure successful deployment and operationalize it to become a security superhero?
Which are covered in detail in our dedicated best-practise guide.
Protecting Crown Jewel Assets: What's Your Action Plan?