Assessing Duplication of Security Controls.

John P. Gormally, SR
2 min readJan 10, 2024

Organizations during COVID-19 were placed in a challenging position to deploy newer security controls to meet the immediate of supporting a remote workforce. Many next-generation technologies became deployed parallel to existing solutions, including zero-trust architecture (ZTNA), extended detection and response (XDR), and cloud-based multi-factor authentication.

After COVID-19, many organizational IT and security operations teams continued to support dual security internal controls, contributing to an alarming trend of duplication.

Importance of Assessing Duplication of Security Controls.

CIOs and CISOs wanting to address the duplication of security controls continue to engage cybersecurity consulting firms with little or nothing to do with COVID-19 rapid deployment strategies. These arbitrary third-party firms with expertise in security assessments can deliver an exceptional value to these C-level executives by identifying duplications and dependencies.

Benefits of Assessing Duplication of Security Controls.

By identifying the various duplications of security controls, organizations can reduce their cost of licenses and operational costs and mitigate cyber-attack risk.

Annual assessments also help organizations understand the various interlocking dependencies their internal and external system have regarding their various security controls. Overlapping security controls often face the challenge of becoming part of a split deployment. This common yet challenging problem within IT centers on enabling a new control while attempting to phase out the legacy solution. The problem arises when the phasing-out engagement is forced to stop partially because of technical or operational dependencies. Until these dependencies are resolved, the organization could face a split deployment issue.

Consultants with experience in legacy and replacement technology can help undo the split deployment dependency issue while creating a net-new strategy for replacing existing solutions.

Why Assessing Before Investing in New Security Controls?

In the post-COVID-19 work environment, CIOs and CISOs should take extra caution, mandating their SecOps and IT engineers to hire third-party accessors to review their enterprise environments, look for control duplication, and document the various dependencies. With this fresh approach, organizations can save money, time, and effort in staying current with the latest security control technology and processes.

#sunriseinsaigon hashtag#bookstagrammerph hashtag#bookstagramph hashtag#bookstagramphilippines hashtag#bookishpinoy hashtag#instamug hashtag#stonewareph hashtag#coffeeandcurrentlyreading hashtag#coffeewithaview hashtag#coffeebooked hashtag#kapetayo hashtag#coffeenook hashtag#baguiocity hashtag#podcast hashtag#writerscommunity hashtag#booklovers hashtag#fictionwriting hashtag#goodreads hashtag#author hashtag#writing hashtag#bookclubs hashtag#fiction hashtag#writer hashtag#cycling hashtag#coffee hashtag#booklover hashtag#austinmacauley hashtag#saferoadsforlife hashtag#bookstagramersph hashtag#bookstack #cybersecurity

--

--

John P. Gormally, SR

John P. Gormally is a fictional and non-fictional cybersecurity blogger and writer based in Lake Forest California.