Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

website/blog: automated versus human #7745

Merged
merged 5 commits into from
Nov 30, 2023
Merged

website/blog: automated versus human #7745

merged 5 commits into from
Nov 30, 2023

Conversation

tanberry
Copy link
Contributor

@tanberry tanberry commented Nov 30, 2023

This week's blog ready for review and approval.

  • The documentation has been updated
  • The documentation has been formatted (make website)

@tanberry tanberry requested a review from a team as a code owner November 30, 2023 18:25
Copy link

netlify bot commented Nov 30, 2023

Deploy Preview for authentik-storybook failed.

Name Link
🔨 Latest commit e89ccfe
🔍 Latest deploy log https://app.netlify.com/sites/authentik-storybook/deploys/656913040a50900008a02638

@authentik-automation
Copy link
Contributor

Images automagically compressed by Calibre's image-actions

Compression reduced images by 42.5%, saving 10.35 KB.

Filename Before After Improvement Visual comparison
website/blog/2023-11-30-automated-security-versus-the-security-mindset/authentication.png 24.34 KB 13.99 KB -42.5% View diff

195 images did not require optimisation.

Copy link

netlify bot commented Nov 30, 2023

Deploy Preview for authentik ready!

Name Link
🔨 Latest commit 930399c
🔍 Latest deploy log https://app.netlify.com/sites/authentik/deploys/6568d3a9056f950008b761fd
😎 Deploy Preview https://deploy-preview-7745--authentik.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.
Lighthouse
Lighthouse
1 paths audited
Performance: 91 (🔴 down 3 from production)
Accessibility: 90 (no change from production)
Best Practices: 100 (no change from production)
SEO: 80 (no change from production)
PWA: -
View the detailed breakdown and full score reports

To edit notification comments on pull requests, go to your Netlify site configuration.

Copy link

netlify bot commented Nov 30, 2023

Deploy Preview for authentik ready!

Name Link
🔨 Latest commit e89ccfe
🔍 Latest deploy log https://app.netlify.com/sites/authentik/deploys/65691304f066690008951d02
😎 Deploy Preview https://deploy-preview-7745--authentik.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.
Lighthouse
Lighthouse
1 paths audited
Performance: 97 (🟢 up 3 from production)
Accessibility: 90 (no change from production)
Best Practices: 100 (no change from production)
SEO: 80 (no change from production)
PWA: -
View the detailed breakdown and full score reports

To edit notification comments on pull requests, go to your Netlify site configuration.

Copy link

codecov bot commented Nov 30, 2023

Codecov Report

All modified and coverable lines are covered by tests ✅

Comparison is base (f559d25) 92.62% compared to head (e89ccfe) 92.64%.

Additional details and impacted files
@@            Coverage Diff             @@
##             main    #7745      +/-   ##
==========================================
+ Coverage   92.62%   92.64%   +0.02%     
==========================================
  Files         588      588              
  Lines       29141    29141              
==========================================
+ Hits        26991    26997       +6     
+ Misses       2150     2144       -6     
Flag Coverage Δ
e2e 50.72% <ø> (+0.02%) ⬆️
integration 25.94% <ø> (ø)
unit 89.71% <ø> (ø)

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

Copy link
Contributor

@kensternberg-authentik kensternberg-authentik left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

There's one major typo (one does not "detach" a threat, one "detects" a threat). Everything else is just me being a red-pen pain-in-the-posterior, as usual.

---

Automated security plays a large and increasingly overarching role in cybersecurity. With the growth of Machine Learning (ML) and Artificial Intelligence (AI), automation is frequently assumed to be the future of cybersecurity as a whole. However, thanks to the work of computer security experts like [Bruce Schneier](https://en.wikipedia.org/wiki/Bruce_Schneier), we've gained insight into the human adversaries that create the underlying problems in cybersecurity.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggestion:

Automation plays a large and increasingly important role in cybersecurity. Cybersecurity vendors promote their Machine Learning and Artificial Intelligence products as the inevitable future. However, thanks to the work of security experts like Bruce Schneier, we have more insight into the human adversaries that create the underlying risks to network security, and a better understanding of why teaching humans to have a security mindset is the critical first step to keeping your network safe.


Automated security is such a popular option purely because of the current dynamics:

- On the one hand, there is a growing number of security incidents, instigated by systematic threat actors who may use the exact same auto security testing tools to find and target weaknesses
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Question: systematic or systemic?

- On the one hand, there is a growing number of security incidents, instigated by systematic threat actors who may use the exact same auto security testing tools to find and target weaknesses
- On the other, there is a shortage of trained cybersecurity professionals with adequate time resources to deal with those threats

Meanwhile, companies concerned about the security of their networks are facing the demands of savvy insurers keen to reduce their risks in turn, while CISOs are coming under increasing personal pressure, considering some have faced new warnings of personal liabilities (including jail time, as we wrote about in a [recent blog](https://goauthentik.io/blog/2023-11-22-how-we-saved-over-100k#repercussions)) from government legislators.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggestion: in turn

That's just padding. The text flows better without.


Meanwhile, companies concerned about the security of their networks are facing the demands of savvy insurers keen to reduce their risks in turn, while CISOs are coming under increasing personal pressure, considering some have faced new warnings of personal liabilities (including jail time, as we wrote about in a [recent blog](https://goauthentik.io/blog/2023-11-22-how-we-saved-over-100k#repercussions)) from government legislators.

But it's not just a personnel problem. The nature of some cybersecurity approaches, such as penetration testing, also plays a part. Many of a security engineer’s tasks are repetitive and prolonged. Automated security testing means time can be freed up to make the best use of an internal security engineer or external pentester's resources.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Question: "Automated" or "Automating"?

"Automating security testing can allow your internal security or penetration testing teams to make better use of their time and resources."


But it's not just a personnel problem. The nature of some cybersecurity approaches, such as penetration testing, also plays a part. Many of a security engineer’s tasks are repetitive and prolonged. Automated security testing means time can be freed up to make the best use of an internal security engineer or external pentester's resources.

Finally, it is impossible to deny that securing the perimeter (running regular scans for misconfigurations and unusual behavior) and enforcing robust security policies are all impossible to deploy without some automation. 24/7/365 monitoring, processing massive data sets, and rapid threat detection and remediation all call for significant automated elements. Automated security is also key in helping scale cybersecurity operations to match company, staffing, system, and platform growth.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Question: "...are all impossible to deploy..." or "...are all but impossible to deploy..." ?


### Human elements of cybersecurity

Even in a cybersecurity system that is maximally automated, there is human input that can never be removed. Obviously, human experts are needed to guide the automated systems in their functioning. Automation technology depends on humans to set rules and workflows, monitor results over time, and rapidly prioritize then respond to alarming findings.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggestion: Remove the comma in the first sentence. It flows better.


Even in a cybersecurity system that is maximally automated, there is human input that can never be removed. Obviously, human experts are needed to guide the automated systems in their functioning. Automation technology depends on humans to set rules and workflows, monitor results over time, and rapidly prioritize then respond to alarming findings.

Once new and significant threats are detached by the automated security, it is human experts again who have to adjust the performance of the automated system as a response to this changing environment. Any further changes need humans to evaluate the performance of automated systems in real-time. Finally, it is humans who train staff in cyber threat detection for these new dangers.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Typo! s/detached/detected/


### Human-centered cybersecurity

Despite the growing technology around automated security, and the temptation to relax when it is deployed, there are human factors that are irreplaceable in the practice of cybersecurity. We recently wrote about the importance of the “Blue Team” and how [organizational and product hardening](https://goauthentik.io/blog/2023-11-22-how-we-saved-over-100k#hardening) are an integral part of our human-centered security mindset.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggestion: Remove the first comma. "Despite the growing technology around automated security and the temptation to relax when it is deployed..." Make the temptation to relax an intrinsically bad idea that's somewhat natural when deploying automation.


Despite the growing technology around automated security, and the temptation to relax when it is deployed, there are human factors that are irreplaceable in the practice of cybersecurity. We recently wrote about the importance of the “Blue Team” and how [organizational and product hardening](https://goauthentik.io/blog/2023-11-22-how-we-saved-over-100k#hardening) are an integral part of our human-centered security mindset.

- The human ability to think creatively and rapidly adapt to changing situations are invaluable to good security processes.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hmm. There's a singular/plural problem here. Maybe "abilities," since you list two? Or "ability to think creatively and adapt rapidly to changing situations...?"

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

oooff good catch thanks!

Despite the growing technology around automated security, and the temptation to relax when it is deployed, there are human factors that are irreplaceable in the practice of cybersecurity. We recently wrote about the importance of the “Blue Team” and how [organizational and product hardening](https://goauthentik.io/blog/2023-11-22-how-we-saved-over-100k#hardening) are an integral part of our human-centered security mindset.

- The human ability to think creatively and rapidly adapt to changing situations are invaluable to good security processes.
- The higher the security risk, the more related processes must be supervised by skilled security professionals.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is a humans-first essay, so, uh, let's put the humans first: "The higher the security risk, the more you need skilled security professionals to supervise the security process."

@tanberry tanberry merged commit 46f223b into main Nov 30, 2023
@tanberry tanberry deleted the blog-auto-sec branch November 30, 2023 23:20
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants