What Is Cybersecurity Mesh Architecture (CSMA)?
“A cybersecurity mesh is a platform that provides centralized management and visibility across a vast ecosystem of solutions, and it automatically adapts to dynamic changes in the network. These platforms promote the interoperability and coordination of individual security products, leading to more cohesive security,” Hawang says.
Joe Tibbetts, vice president of tech alliances and API at Mimecast, says centralized management of disparate security tools empowers government to tune different platforms simultaneously.
“It grants security teams visibility, access and proper controls over their entire security apparatus,” Tibbetts says of cybersecurity mesh. “It delivers central visibility of all of your security tools in a fashion that is easy to consume, and it provides efficiency at scale.”
He adds, “When you want to create a new policy, do you want to do that in seven different security products? Or can you have a central policy function? Every single organization has a different security process, different posture and different tools. Cybersecurity mesh brings that all together in a system of systems.”
DIVE DEEPER: Fortify your front lines by integrating asset management and cybersecurity.
How Does CSMA Strengthen Defense Government Systems?
Aaron Rose, security architect manager in the office of the CTO at Check Point Software, says that government agencies could previously match point solutions to attack vectors. That was effective when employees were under one roof, but many workers are on the job while traveling or working remotely.
“Everything used to be housed within a data center, and all of your people would sit inside of headquarters or a branch office. You could draw a line, or a box, around each of those locations. Your data center would be protected by a centralized security tool,” Rose says. “The problem is, where do you draw your boxes now? Do you draw it around my house and the airport and then follow me across the country as I’m traveling? It’s hard to draw a box around where your employees are or where your data is being housed because we’ve moved more toward mobility and toward cloud services.”
Workforces generally began working from anywhere with the rise of powerful broadband solutions, but the COVID-19 pandemic accelerated that trend, Rose says.
“The majority of organizations are using cloud services from multiple vendors. They might be using Microsoft 365 for email, documents and collaboration. They could also be using a mixture including Google Workspace. They might be using things such as Salesforce or other Platform as a Service solutions. A little bit of the data is everywhere.”
“The idea behind cybersecurity mesh is that you’re going to follow the users and follow the data, no matter where they go,” he says.
Tibbetts says, “It’s giving security teams visibility, access and proper controls over their entire security apparatus. It’s having central visibility of all of your security tools in a fashion that is easy to consume. It’s having detection capabilities, so you don’t have to chase down alarms that you have to investigate, giving you efficiency at scale.”
Should an agency seek to establish a new security policy, it can enact it once for the centralized command rather than individually across separate security products.
“It gives you the ability to increase your protection, increase your detection capabilities, and increase your efficiency for operational oversight over whatever security tools, stacks and processes you may have,” Tibbetts says.