In October 2022, CISA (Cybersecurity and Infrastructure Security Agency) that multiple hackers had compromised a defense industrial base organization, gaining long-term access to the environment and exfiltrating sensitive data. And those threats are increasing. Since, 2015 the DoD has experienced over .
Strong, resilient next-generation networks that protect sensitive data and DoD missions and functions have never been more critical. But, with a complex interconnected information environment, how can federal IT teams strengthen cybersecurity and become proactive instead of reactive? Army leaders have spent much time discussing resilient next-generation networking, but action needs to be taken soon.
To achieve greater network resilience, here are three steps that federal IT leaders can take to prepare for an unpredictable future and safeguard its networks 鈥 and those of its contractors 鈥 from malicious cyber activity.
-
Progress the DoD鈥檚 鈥渄efend forward鈥 strategy
The DoD鈥檚 鈥溾 strategy is nothing new. First outlined in the , the initiative is designed to 鈥渄isrupt malicious cyber activity at its source.鈥 This refers to any device, network, organization, or adversary nation that poses a threat to U.S. networks and institutions or is actively attacking them.
Notably, the strategy shifts DoD and U.S. Cyber Command鈥檚 cybersecurity program from reactive to proactive. Rather than detect and remediate threats as they arise, defend forward actively seeks out threats and eliminates them.
U.S. Cyber Command restated its pledge to 鈥渄efend forward鈥 in October 2022, but it鈥檚 principles and standards must be extended across the defense industrial base 鈥 the networks and systems that contribute to U.S. military advantages.
Government contractors are held accountable for their cybersecurity practices and choices, but for true resilience, DoD security leaders must establish new standards for information sharing with their private sector counterparts.
In addition to standing by DoD鈥檚 pledge to share indications and warnings of malicious cyber activity, DoD must continue to move beyond transactional vendor relationships. Toll-free numbers are not enough for federal CISOs 鈥 they need a dedicated, trusted, point of contact within each defense contractor. Someone with whom they can have frequent and honest conversations, conduct deliberate planning, and oversee collaborative training that enables mutually supporting cyber activities.
-
Embrace AIOps: The next big thing in networking
Powered by artificial intelligence (AI) and machine learning, is a relatively new approach to network monitoring that boosts resilience by reducing the time it takes to discover issues, detect anomalies, and gives network engineers the context they need to remediate 鈥 before a threat materializes.
AIOps-powered works by automating the complex task of collecting and analyzing network data across the vast DoD network infrastructure and turning that data into actionable intelligence. With this insight, teams can proactively address network or cyber issues and even predict certain situations 鈥 such as signs of network intrusion. A key advantage of AIOps is that it observes remedial action taken and uses these observations to automatically respond to future problems without the need for IT鈥檚 involvement 鈥 thereby ensuring a more resilient, autonomous network.
-
Layer in multipath monitoring
Enterprise networks have traditionally been comprised of multiple hub and spoke topologies with linear routing paths and clearly defined traffic flows. But hybrid IT, hyperconverged infrastructure, and modern networking have created complex multipath network environments 鈥 any given packet can take any number of different routes, all of which are changing at any moment.
Unfortunately, these multipath topographies can鈥檛 easily be visualized using traditional network monitoring tools. There鈥檚 simply not enough time in the day to diagram the network, let alone proactively monitor the application traffic and hardware links that comprise it.
The answer lies in finding a network performance monitoring tool that combines multipath monitoring with traditional infrastructure monitoring for greater visibility into network security.聽 Having this insight will allow federal network pros to proactively manage multiple networks, identify issues, and fix them before they get out of hand.
A smarter and more collaborative defense
Network resiliency can be achieved at scale, but it will take a concerted effort. Through greater collaboration between the DoD and private sector, as well as the adoption AIOps-powered observability, the DoD will be better prepared to manage and secure increasingly complex, dynamic military network environments.
To learn more about SolarWinds鈥 AIOps-powered Hybrid Cloud Observability Solution, click聽.