The Full Potential of CARTA as envisaged by Gartner

How enterprises can realize the full potential of CARTA

 

Trust has traditionally been the cornerstone of network security. It’s what allows everything from files to data packets to move across a network, while also controlling permissions for end users.

 

But in modern networking, establishing trust is getting harder. Detection systems for cyberattack have traditionally needed pre-designed signatures that identify specific sets of malicious code, or anomalies in the normal data flow.

 

In an increasingly digital business world, binary decisions like allow or block no longer work. That’s where CARTA comes in.

 

CARTA stands for continuous adaptive risk and trust assessment. It’s a cybersecurity model envisaged by tech analysts Gartner that builds on their concept of Adaptive Security Architecture – but takes it further.

 

It’s based on the idea that enterprises now need to embrace a continuously adaptive cybersecurity posture that can keep pace with the persistent evolution of new tools and tactics used by cyber criminals.

 

“In an increasingly digital business world, binary decisions like allow or block no longer work.”

 

Current methods of establishing trust also leave the door wide open for insider threats. Because inside users are pre-defined as safe by the network, malicious or negligent activity like data leaking is less likely to set alarm bells ringing.

 

Enterprises now have to decide how to say ‘yes’ to transactions when all the information they had in the past isn’t available, or when saying yes brings a level of risk. CARTA accepts that permissions have to be granted within the more fluid criteria of risk and trustworthiness.

 

Cybersecurity systems therefore have to become smarter, in order to weight variables and make sound – but complex – decisions.

 

CARTA’s core principles

 

CARTA treats every network connected system or device as potential sources of breach, so the behaviour of every network asset is continuously assessed for risk and trust. That requires CARTA to be applied across three phases of information security and risk management:

 

Run

For CARTA to work, data analytics have to be part of the cyber-arsenal, with machine learning offering the most value in terms of finding anomalies.

 

Security analytics can detect intrusions and infections that might otherwise bypass rules-based prevention systems.

 

In the US, the average time before a breach is detected is 99 days, at an average cost of remediation of $4 million. By speeding up and automating detection, response time is shortened and costs contained. Machine learning can also help enterprises focus limited resources on events with the highest risk.

 

Build

CARTA also requires organizations to continuously assess their ecosystem risk. It assumes that partners and trusted vendors assume some responsibility for sustaining a customer’s or client’s cybersecurity and brand reputation.

 

Major digital partners should only be allowed into an organization’s IT ecosystem after a rigorous security and risk assessment – and should be monitored continuously to assess the risk they might pose in the future.

 

Plan

Under a CARTA mindset, compliance and governance are continuously assessed at an enterprise level. Analytics can provide the basis for predictive models around key business risks, and the value of opportunities that might be available if more risk is taken on.

 

Applying CARTA in real life

 

Enterprises are already shifting security budgets from legacy tools like firewalls to focus more heavily on machine learning and data analytics.

 

The early adopters are constantly assessing network data traffic patterns to fine tune security protocols, and building a cybersecurity posture better suited to today’s threat environment.

 

Driven by dynamic technologies like mobile, Cloud, and IoT, digital transformation of the economy has made binary approaches to threat detection obsolete. Protecting an attack surface that’s constantly expanding – which may not have a perimeter – requires a continuous approach to assessing vulnerability and identifying cyber risks.

 

CARTA provides a road map for implementing a security program capable of responding to the velocity and volume of new threats, and their fast-changing nature.

 

Smart Data Loss Prevention solutions can help enterprises realize CARTA’s potential by making data protection and network security more responsive – adapting as they monitor and learn. These new smart systems can also produce more defined data classification rules, and better control access permission by more accurately identifying legitimate users.

 

As CARTA becomes the norm in cybersecurity, system managers will improve their ability to identify malicious activity and stop cyber-criminals from damaging or stealing data.

adroll_adv_id = “UIOFH72HVBDSPBBLAJUZE6”;
adroll_pix_id = “HNO2CUNA4BAINCHLEPH2JH”;
/* OPTIONAL: provide email to improve user identification */
/* adroll_email = “username@example.com”; */
(function () {
var _onload = function(){
if (document.readyState && !/loaded|complete/.test(document.readyState)){setTimeout(_onload, 10);return}
if (!window.__adroll_loaded){__adroll_loaded=true;setTimeout(_onload, 50);return}
var scr = document.createElement(“script”);
var host = ((“https:” == document.location.protocol) ? “https://s.adroll.com” : “http://a.adroll.com”);
scr.setAttribute(‘async’, ‘true’);
scr.type = “text/javascript”;
scr.src = host + “/j/roundtrip.js”;
((document.getElementsByTagName(‘head’) || [null])[0] ||
document.getElementsByTagName(‘script’)[0].parentNode).appendChild(scr);
};
if (window.addEventListener) {window.addEventListener(‘load’, _onload, false);}
else {window.attachEvent(‘onload’, _onload)}
}());

Visibility: Accurately, discover sensitive data; detect and address broken business process, or insider threats including sensitive data breach attempts.

Protection: Automate data protection, breach prevention and incident response both on and off the network; for example, find and quarantine sensitive data within files exposed on user workstations, FileShares and cloud storage.

Notification: Alert and educate users on violations to raise awareness and educate the end user about cybersecurity and corporate policies.

Education: Start target cyber-security training; e.g., identify end-users violating policies and train them.

  • Employees and organizations have knowledge and control of the information leaving the organization, where it is being sent, and where it is being preserved.
  • Ability to allow user classification to give them influence in how the data they produce is controlled, which increases protection and end-user adoption.
  • Control your data across your entire domain in one Central Management Dashboard with Universal policies.
  • Many levels of control together with the ability to warn end-users of possible non-compliant – risky activities, protecting from malicious insiders and human error.
  • Full data discovery collection detects sensitive data anywhere it is stored, and provides strong classification, watermarking, and other controls.
  • Delivers full technical controls on who can copy what data, to what devices, what can be printed, and/or watermarked.
  • Integrate with GRC workflows.
  • Reduce the risk of fines and non-compliance.
  • Protect intellectual property and corporate assets.
  • Ensure compliance within industry, regulatory, and corporate policy.
  • Ability to enforce boundaries and control what types of sensitive information can flow where.
  • Control data flow to third parties and between business units.