<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/authors/patrick-kaak/rss" /><link>https://www.ivanti.com/blog/authors/patrick-kaak</link><item><guid isPermaLink="false">59c8d40d-128f-4f12-a8a8-845aa4734fca</guid><link>https://www.ivanti.com/blog/modern-application-control-trusted-ownership-vs-allowlisting</link><atom:author><atom:name>Patrick Kaak</atom:name><atom:uri>https://www.ivanti.com/blog/authors/patrick-kaak</atom:uri></atom:author><category>Security</category><title>Trusted Ownership: How Ivanti Application Control scales beyond allowlisting</title><description>&lt;p&gt;Application control is one of those security topics where many people carry old assumptions. Traditional allowlisting feels safe but quickly becomes a maintenance burden. Blocklisting feels reactive and incomplete. And while tools like Microsoft AppLocker led many to believe that strict allowlisting is the gold standard, modern attacks have proven otherwise. Attackers increasingly rely on &lt;i&gt;legitimate, signed tools &lt;/i&gt;— used in the wrong context — to bypass list-based controls entirely.&lt;/p&gt;

&lt;p&gt;So when organizations evaluate &lt;a href="https://www.ivanti.com/products/application-control"&gt;Ivanti Application Control&lt;/a&gt; or &lt;a href="https://www.ivanti.com/products/app-control-and-privileged-management"&gt;Ivanti Neurons for App Control&lt;/a&gt; and encounter Trusted Ownership, it may initially resemble blocklisting because explicit blocks are possible. In reality, Trusted Ownership is a far broader and far lighter operationally inspired‑ enforcement model that controls execution based on origin, not just identity.&lt;/p&gt;

&lt;p&gt;Instead of managing expanding lists, it enforces security on who has placed software on the system, aligning cleanly with modern software distribution practices and zero trust principles. It’s best understood not as another list mechanism, but as a provenance inspired enforcement model that controls execution based on origin, not just identity.&lt;/p&gt;

&lt;p&gt;That shift in thinking leads to a better question for modern application control: not only what a file &lt;i&gt;is&lt;/i&gt;, but &lt;i&gt;how it got there.&lt;/i&gt;&lt;/p&gt;

&lt;h2&gt;Beyond lists: why provenance control now matters&lt;/h2&gt;

&lt;p&gt;The question of how a file arrived on the system is at the core of provenance control. Instead of trusting files based on publisher, path or hash alone, provenance control evaluates the &lt;i&gt;origin and process&lt;/i&gt; that introduced them. &lt;i&gt;Who wrote the file to disk? Through which mechanism? Did the installation follow a controlled IT workflow?&lt;/i&gt; This evaluation shifts application control from object trust to process trust, creating a far stronger security boundary.&lt;/p&gt;

&lt;p&gt;In Ivanti Application Control, provenance control is implemented as &lt;a href="https://help.ivanti.com/ap/help/en_US/am/2025/Content/Application_Manager/Trusted_Owners.htm" target="_blank"&gt;Trusted Ownership&lt;/a&gt;. Any file placed by a trusted owner is allowed; anything introduced by a user is denied by default. This applies consistently across executables, DLLs, installers and scripts. Because identities like SYSTEM, TrustedInstaller and Administrators are trusted by default, software delivered through standard deployment channels such as MS Intune, MECM, Ivanti Endpoint Manager (EPM)or other enterprise tools runs immediately without rule maintenance or exceptions.&lt;/p&gt;

&lt;p&gt;This marks a fundamental break from classic allowlisting. AppLocker rules live or die based on exact publisher, path or hash definitions. It doesn't evaluate installation origin and doesn't automatically trust your deployment mechanisms. Software delivered by Intune still requires a preexisting allow rule, often relying on broad defaults that permit the Program Files or Windows directories.&lt;/p&gt;

&lt;p&gt;&lt;img alt="A flowchart illustrates an app provenance engine that allows trusted origins and blocks untrusted ones. On the left, a trusted IT admin provides a company app, which is allowed by the provenance engine and marked with a green check. On the right, a user tries to introduce an unknown executable (EXE), which is blocked by the provenance engine, marked with a red X. The blocked executable is shown again at the bottom with a cross mark. The diagram visually separates trusted, allowed content from untrusted, blocked content." src="https://static.ivanti.com/sites/marketing/media/images/blog/2026/02/actrustedownershipblog_image1.jpg"&gt;&lt;/p&gt;

&lt;p&gt;That distinction matters because modern attacks increasingly weaponize legitimate tools in improper contexts. Provenance control neutralizes much of that risk by enforcing trust in &lt;i&gt;how&lt;/i&gt; software arrives, not just &lt;i&gt;what&lt;/i&gt; it is. It aligns with zero trust principles, reduces supply chain exposure, and dramatically narrows opportunities for Living off the Land (LotL) abuse by default.&lt;/p&gt;

&lt;p&gt;Once you understand the importance of origin, the next question becomes: how do you enforce it at scale?&lt;/p&gt;

&lt;p&gt;The answer: apply provenance consistently across all the ways software executes and all the ways it is delivered.&lt;/p&gt;

&lt;h2&gt;Beyond Blocklists: Broad coverage built for modern software deployment&lt;/h2&gt;

&lt;p&gt;Provenance control shifts application security away from managing endless lists and toward validating the process by which software arrives on the system. Once you adopt this perspective, it becomes clear that Trusted Ownership is not a blocklist approach. It's an origin-based trust boundary that behaves very differently from traditional allowlisting.&lt;/p&gt;

&lt;p&gt;A common misconception is that Trusted Ownership resembles blocklisting because administrators sometimes add targeted deny rules for well-known Windows tools. In practice, these deny rules are defensive hardening measures against Living off the Land techniques. Every serious application control method uses such targeted restrictions. The core of Trusted Ownership is the opposite of blocklisting. Software delivered through a controlled and trusted process is permitted by default, while user-introduced content is denied by default.&lt;/p&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="platform" value="youtube"&gt;&lt;param name="lang" value="en"&gt;&lt;param name="id" value="cMWocpzF3Uo"&gt;&lt;param name="cms_type" value="video"&gt;&lt;/object&gt;&lt;/p&gt;

&lt;p&gt;A more important differentiator is coverage. Many organizations that rely on classic allowlists end up focusing almost entirely on executable files. They often avoid applying the same enforcement to DLLs, scripts and MSI packages because these file types make rule maintenance far more complex. This creates gaps that modern attackers frequently exploit.&lt;/p&gt;

&lt;p&gt;Trusted Ownership avoids these gaps by applying the same origin-based enforcement to the full execution chain. Executables, DLLs, scripts, MSI installers and related components are evaluated through the same trust model. Because trust is determined by who introduced the file, you do not need separate policies for each file type. A script in the Downloads folder, a DLL created in a temporary build directory or an EXE executed from a user profile all receive the same default deny treatment when they originate outside a controlled installation process.&lt;/p&gt;

&lt;p&gt;This trust model also aligns naturally with how modern endpoint management platforms deliver software. Solutions such as Intune, MECM, Ivanti Neurons for MDM, &lt;a href="https://www.ivanti.com/products/endpoint-manager"&gt;Ivanti Endpoint Manager&lt;/a&gt; and similar systems typically install applications using the SYSTEM identity or another trusted service account.&lt;/p&gt;

&lt;p&gt;Since these identities are already Trusted Owners, software deployed through these channels runs immediately without creating allow rules, maintaining file paths or updating policies. Only when you intentionally use alternative installation accounts, such as custom DevOps agents or scripted installations in user context, do you need to identify that identity as a Trusted Owner.&lt;/p&gt;

&lt;p&gt;The result is a model with broad and consistent coverage across all relevant file types. It works seamlessly with modern software distributions and avoids the operational overhead associated with classic allowlists that focus mainly on executable files.&lt;/p&gt;

&lt;p&gt;Trusted Ownership places trust not in individual objects but in the controlled processes through which software is delivered, creating a more scalable and more secure approach to application control.&lt;/p&gt;

&lt;h2&gt;Where WDAC (App Control for Business) fits in&lt;/h2&gt;

&lt;p&gt;Microsoft maintains two application control technologies: AppLocker and App Control for Business (formerly WDAC). Although both still exist, Microsoft is clear about their roles. AppLocker helps prevent users from running unapproved applications, but it does not meet the servicing criteria for modern security features and is therefore categorized as a &lt;a href="https://learn.microsoft.com/en-us/windows/security/application-security/application-control/app-control-for-business/applocker/applocker-overview" rel="noopener" target="_blank"&gt;defense-in-depth mechanism rather than a strategic security control&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Microsoft’s forward path for application control is App Control for Business and explicitly states that AppLocker is feature-complete and no longer under active development, beyond essential security updates. This means all new capabilities are delivered only in WDAC and not in AppLocker.&lt;/p&gt;

&lt;p&gt;App Control for Business introduces the &lt;i&gt;Managed Installer&lt;/i&gt; concept. This allows Windows to automatically trust applications installed through designated deployment platforms such as Intune or MECM. Trust is derived from the distribution channel rather than individual files, reducing rule maintenance significantly.&lt;/p&gt;

&lt;p&gt;This aligns closely with Ivanti Application Control’s Trusted Ownership model. Both approaches trust software based on the controlled process that installed it rather than on discrete file attributes. However, Trusted Ownership applies this concept in a simpler and more operationally accessible way. Ivanti trusts identities such as SYSTEM and designated service accounts without requiring complex policy layers, XML definitions or deep WDAC expertise.&lt;/p&gt;

&lt;p&gt;Ivanti hears from many organizations that they struggle to operationalize WDAC. WDAC policies require careful design, lengthy testing in audit mode, driver and kernel exception management and ongoing maintenance of multiple policy sets. &lt;a href="https://www.reddit.com/r/Intune/comments/16oov9d/is_anyone_actually_successfully_deploying_wdac_as/" rel="noopener" target="_blank"&gt;This often leads organizations to combine WDAC with AppLocker&lt;/a&gt; to cover both low-level enforcement and day-to-day user space control and end up with administrative overhead.&lt;/p&gt;

&lt;p&gt;Ivanti Application Control offers a unified alternative. Through Trusted Ownership, Trusted Vendors and digital signature validation, it delivers a provenance-based default deny model with consistent coverage across executables, DLLs, scripts and MSI packages.&lt;/p&gt;

&lt;p&gt;Instead of maintaining two MS control planes with different scopes, organizations manage a single, streamlined policy that enforces trust based on how software is introduced into the system. This provides many of the practical goals customers attempt to achieve with a combined WDAC and AppLocker deployment, but with lower operational complexity and one cohesive trust model.&lt;/p&gt;

&lt;h2&gt;LOLBins and argument-level control&lt;/h2&gt;

&lt;p&gt;With broad coverage established, the issue then becomes how to handle the legitimate tools already on every machine that attackers like to abuse.&lt;/p&gt;

&lt;p&gt;Modern attackers often avoid using traditional malware and instead rely on the tools already present on every Windows device. These Living off the Land tools (LOLBins) are legitimate and necessary for normal operations, which makes them difficult to block without affecting productivity. Traditional allowlisting struggles here because broad blocking breaks workflows, while broad allowing leaves dangerous gaps.&lt;/p&gt;

&lt;p&gt;A provenance-based model such as Trusted Ownership changes this dynamic. Even if an attacker attempts to use a built-in tool, the content they try to run usually does not come from a trusted installation process. Since Ivanti evaluates the origin of that content, most misuse attempts fail automatically. The tool may be legitimate, but the content it is asked to run is not, and Trusted Ownership stops it before it executes.&lt;/p&gt;

&lt;p&gt;It is also important to understand not only which tools run but what they are being asked to do. Many interpreters and runtimes, such as PowerShell, Python, or Java, can be perfectly safe in one context and risky in another. A business application may rely on Java to start a specific, approved process, while a user downloaded JAR file is an entirely different scenario.&lt;/p&gt;

&lt;p&gt;&lt;img alt="A diagram explains how PowerShell scripts are evaluated in two security layers: Ownership and Intent. The first layer uses a trusted ownership check to block malicious scripts, while allowing approved commands using argument-level control. The second layer, focused on intent, uses policy enforcement to block malicious activity while allowing legitimate processes to run. Icons represent scripts, commands, and shield checks, with arrows showing allowed and blocked paths." src="https://static.ivanti.com/sites/marketing/media/images/blog/2026/02/actrustedownershipblog_image2.jpg"&gt;&lt;/p&gt;

&lt;p&gt;Ivanti handles this through a layered approach. A JAR file is first evaluated using Trusted Ownership, which blocks it immediately if it was introduced by a user rather than through a controlled deployment process. Beyond that, administrators can create simple allow rules that specify exactly which Java commands are permitted, ensuring that only legitimate Java based applications run while attempts to launch unapproved JAR files are quietly denied.&lt;/p&gt;

&lt;p&gt;The same principle applies across other tools as well. Policies can approve the exact behavior your organization needs while blocking activities that fall outside those boundaries. This avoids broad, brittle rules and keeps daily work running smoothly.&lt;/p&gt;

&lt;p&gt;The result is a balanced and modern approach. Trusted Ownership stops untrusted content by default. Focused hardening aligns with government and community best practices for reducing living off the land abuse and intent aware controls ensure that legitimate processes continue to function without opening doors for attackers.&lt;/p&gt;

&lt;p&gt;This approach closely aligns with current community and government guidance on mitigating living off the land techniques. Agencies such as CISA, NSA, FBI and the &lt;a href="https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/identifying-and-mitigating-living-off-the-land-techniques#best-practice-recommendations" rel="noopener" target="_blank"&gt;Australian Cyber Security Centre&lt;/a&gt; emphasize reducing opportunities for attackers to use built-in tools by controlling how they are used and restricting the untrusted content they act upon. Their joint guidance highlights that LOTL attacks depend on abusing native tools and stresses the need for controls that limit this misuse without blocking legitimate system processes.&lt;/p&gt;

&lt;p&gt;Ivanti’s model reflects this guidance. Trusted Ownership automatically blocks the untrusted content that attackers rely on, while a small number of focused restrictions address the small set of tools that require extra care.&lt;/p&gt;

&lt;h2&gt;Trusted Ownership in action: Real-world scenarios&lt;/h2&gt;

&lt;p&gt;&lt;b&gt;Here are a few operational examples of how Ivanti Application Control and Trusted Ownership work in practice.&lt;/b&gt;&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;A portable application is copied into the user profile. Ivanti blocks it because it is user-owned. AppLocker only blocks if there are matching rules. Without the right path or publisher rules, the behavior can differ.&lt;/li&gt;
	&lt;li&gt;An email attachment launches a PowerShell script from Downloads. Ivanti denies it because of user ownership. AppLocker depends on script rules and, on block events, forces PowerShell into Constrained Language Mode, which will still run the script.&lt;/li&gt;
	&lt;li&gt;Abuse of OS tools such as rundll32 or mshta. Both models need targeted deny hardening. Ivanti combines this with provenance control which generally reduces the number of exceptions you need. AppLocker relies on curated deny sets and requires periodic tuning.&lt;/li&gt;
	&lt;li&gt;A vendor update ships new signed files. Ivanti allows the update when it arrives via the trusted deployment channel due to Trusted Ownership. AppLocker can accommodate this with publisher rules, but signature reuse across multiple products or unusual install paths often leads to extra maintenance and broader trust than intended.&lt;/li&gt;
	&lt;li&gt;A user downloads a JAR and tries to run it with Java. Ivanti blocks the attempt because the JAR is user-introduced and fails Trusted Ownership. If needed, admins can allow only the exact approved invocation by matching the full command line. AppLocker cannot match arguments and relies on publisher, path or hash rules.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;Conclusion&lt;/h2&gt;

&lt;p&gt;Provenance control shifts application control from a management problem to a trust model. Instead of trusting individual files, it trusts the process by which software arrives on a system, making security both scalable and workable.&lt;/p&gt;

&lt;p&gt;Trusted Ownership fits squarely into this approach. It is neither a blocklist nor a classic allowlist, but a model where software that arrives through a controlled IT process is allowed by default, while everything outside that process is denied by default. By enforcing on origin and ownership rather than on ad hoc files, &lt;a href="https://www.ivanti.com/products/application-control"&gt;Ivanti Application Control&lt;/a&gt; and &lt;a href="https://www.ivanti.com/products/app-control-and-privileged-management"&gt;Ivanti Neurons for App Control&lt;/a&gt; align far better with modern attack techniques and today’s software distribution.&lt;/p&gt;

&lt;p&gt;If you keep treating application control as a list management exercise, you will feel the administrative burden. If you treat it as a trust boundary, you gain scalability, security, and operational workability.&lt;/p&gt;
</description><pubDate>Wed, 25 Feb 2026 14:25:15 Z</pubDate></item><item><guid isPermaLink="false">014228c1-4c3d-44ed-be07-48ad79ba57b3</guid><link>https://www.ivanti.com/blog/nis2-directives-boards-cybersecurity-governance</link><atom:author><atom:name>Patrick Kaak</atom:name><atom:uri>https://www.ivanti.com/blog/authors/patrick-kaak</atom:uri></atom:author><category>Security</category><title>Boards Talk Cybersecurity — but NIS2 Directive Says They Must Own It</title><description>&lt;p&gt;Cybersecurity finally has a seat in the boardroom. &lt;a href="https://www.ivanti.com/resources/research-reports/state-of-cybersecurity-report"&gt;Ivanti’s 2025 State of Cybersecurity&lt;/a&gt; research shows that:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;89% of organizations now discuss cybersecurity at the board level.&lt;/li&gt;
	&lt;li&gt;81% of organizations have at least one director with cyber expertise.&lt;/li&gt;
	&lt;li&gt;88% of organizations include the CISO in strategic meetings.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;On paper, that’s progress. But, many organizations struggle to convert board-level attention into sustained, measurable risk reduction.&lt;/p&gt;

&lt;p&gt;Ivanti’s data exposes the crux of the problem: only 40% of security teams say risk exposure is communicated to executives “very effectively” — a governance gap with &lt;a href="https://www.williamfry.com/knowledge/nis2-a-game-changer-for-senior-management-and-boards/" rel="noopener" target="_blank"&gt;legal and financial consequences under the EU’s NIS2 Directive&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Let’s take a deeper look at the data from Ivanti’s 2025 State of Cybersecurity Report to see what it tells us — and how to turn those insights into NIS2-ready governance.&lt;/p&gt;

&lt;h2&gt;Why NIS2 changes everything about cybersecurity risk management&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.enisa.europa.eu/sites/default/files/2025-06/ENISA_Technical_implementation_guidance_on_cybersecurity_risk_management_measures_version_1.0.pdf" rel="noopener" target="_blank"&gt;NIS2&lt;/a&gt; broadens the EU’s cybersecurity regime to 18 sectors, tightens supervision and — most consequentially — &lt;a href="https://www.williamfry.com/knowledge/nis2-a-game-changer-for-senior-management-and-boards/" rel="noopener" target="_blank"&gt;assigns direct accountability to the management body&lt;/a&gt;. Boards and senior leaders must approve, oversee and ensure that measures are proper to the risks and effective in practice.&lt;/p&gt;

&lt;p&gt;Failure carries consequences: &lt;a href="https://www.ivanti.com/blog/5-reasons-why-nis2-directive-preparation-should-start-now-part-one-audits-take-time"&gt;audits&lt;/a&gt;, binding instructions and administrative fines up to €10 million or 2% of global turnover. In serious cases, leaders face temporary bans or personal liability.&lt;/p&gt;

&lt;p&gt;Rather than a one-size-fits-all checklist, &lt;a href="https://natlawreview.com/article/eu-nis-2-directive-expanded-cybersecurity-obligations-key-sectors" rel="noopener" target="_blank"&gt;NIS2 expects organizations to prove they manage risk across the lifecycle&lt;/a&gt; (analysis, incident handling and continuity, secure development and supply chain assurance, vulnerability management, training and safeguarded communications) in a manner that’s aligned with the state of the art and proportionate to business impact (per &lt;a href="https://www.nis2-info.eu/article-21-cybersecurity-risk-management-measures/" rel="noopener" target="_blank"&gt;Article 21&lt;/a&gt;).&lt;/p&gt;

&lt;h2&gt;Why boards struggle — and what’s at stake&lt;/h2&gt;

&lt;p&gt;When you translate risk into dashboards of CVE counts, patch rates and tool inventories that obscure business impact, your board of directors misses the CISO’s key points.&lt;/p&gt;

&lt;p&gt;Ivanti’s findings crystallize the disconnect: the conversation is happening, yet few feel exposure is conveyed in a way executives can act upon. The result is misguided prioritization, diffuse budgets and latent exposures that go unaddressed — precisely the scenario &lt;a href="https://www.enisa.europa.eu/topics/awareness-and-cyber-hygiene/raising-awareness-campaigns/network-and-information-systems-directive-2-nis2" rel="noopener" target="_blank"&gt;NIS2 seeks to prevent&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;When things go wrong, costs mount fast. Operational disruption from ransomware, reputational damage, escalating legal exposure and recovery bills often dwarf any administrative fine. With NIS2, ignorance is not a defense; and effective governance requires comprehension, communication and follow-through.&lt;/p&gt;

&lt;h2&gt;Top cybersecurity risks that demand board attention&lt;/h2&gt;

&lt;p&gt;Ivanti’s research highlights where organizations are least prepared and most exposed:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Ransomware and AI&lt;/li&gt;
	&lt;li&gt;End-of-life technology&lt;/li&gt;
	&lt;li&gt;Supply chain security&lt;/li&gt;
	&lt;li&gt;Blind spots (e.g., shadow IT)&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Each risk below maps to NIS2’s governance expectations. Read on to learn about the threat they pose and how to do better in practice.&lt;/p&gt;

&lt;h3&gt;1. Ransomware + AI: The perfect storm&lt;/h3&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;The reality from Ivanti’s research:&lt;/strong&gt;&lt;/u&gt; &lt;a href="https://www.ivanti.com/company/press-releases/2025/ivanti-research-shows-ransomware-is-the-top-predicted-threat-for-2025"&gt;Ransomware still dominates the 2025 threat landscape&lt;/a&gt; — and the stakes are rising. Over a third of security professionals (38%) believe AI will make attacks more dangerous, yet &lt;a href="https://www.channelfutures.com/security/ivanti-flashpoint-reports-show-increasing-cyber-challenges-ahead" rel="noopener" target="_blank"&gt;only 29% feel very prepared to respond&lt;/a&gt;.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/21795381"&gt;&lt;/div&gt;

&lt;p&gt;This gap reflects a familiar pattern: adversaries accelerate with automation while defenders wrestle with fragmented telemetry, manual processes and untested response playbooks.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;How supervisors judge readiness:&lt;/strong&gt;&lt;/u&gt; Under NIS2, resilience cannot be theoretical. Regulators expect response and crisis plans that have been exercised, continuity and recovery targets that are met in practice and preventive controls aligned to business impact (especially identity and patching for critical systems).&lt;/p&gt;

&lt;p&gt;When a significant incident hits, the standard is clear: prompt early warnings, coherent follow-ups within mandated windows and visible command of the situation from containment through recovery.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;Raise your security posture:&lt;/strong&gt;&lt;/u&gt; Treat ransomware as a recurring business risk, not a rare IT event. Rehearse the first 24–72 hours with top leadership, legal and communications so you can make fast, defensible decisions and produce the evidence a supervisor will ask for.&lt;/p&gt;

&lt;p&gt;Don’t just cycle backups — prove restorability of priority services under realistic constraints; tie RTO/RPO directly to revenue and safety. For prevention, orient around exposure: harden and patch critical assets and reduce blast radius with strong authentication, segmentation and least privilege.&lt;/p&gt;

&lt;p&gt;When the board asks for assurance, answer in outcomes: “order-to-cash restored in X hours, confirmed quarterly; stakeholder comms aligned to NIS2’s staged reporting.”&lt;/p&gt;

&lt;h3&gt;2. End-of-life technology: A compliance time bomb&lt;/h3&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;The reality from Ivanti’s research:&lt;/strong&gt;&lt;/u&gt; Over half (51%) of organizations continue to run end-of-life (EOL) software, and one in three organizations say their security is seriously compromised by legacy tech. These legacy blind spots create systemic risk and undermine any claim to state-of-the-art security.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/21795414"&gt;&lt;/div&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;How supervisors judge readiness:&lt;/strong&gt;&lt;/u&gt; NIS2 does not dictate versions, but it does hold you to the principles of appropriateness and state of the art. That means:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;You know where EOL sits.&lt;/li&gt;
	&lt;li&gt;You have a plan to retire it.&lt;/li&gt;
	&lt;li&gt;You mitigate risk while it stays and you decommission securely — including sanitizing data — when it exits service.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Under Article 21, keeping unsupported tech in production without timeboxed, documented mitigations is hard to defend as proportionate risk management.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;Raise your security posture:&lt;/strong&gt;&lt;/u&gt; Move EOL from backlog item to board-owned exposure.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Maintain a live inventory that flags support status a year ahead.&lt;/li&gt;
	&lt;li&gt;Align the retirement path with business owners.&lt;/li&gt;
	&lt;li&gt;Where delay is unavoidable, approve temporary isolation on the network, restricted access and enhanced monitoring — with clear end dates.&lt;/li&gt;
	&lt;li&gt;Close the loop with verifiable data sanitization and auditable records at disposal.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Most importantly, price the risk: “This legacy platform drives X% of revenue; extending nine months adds €Y expected loss unless we isolate and monitor it as follows...”&lt;/p&gt;

&lt;h3&gt;3. Supply chain security: Your weakest link&lt;/h3&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;The reality from Ivanti’s research:&lt;/strong&gt;&lt;/u&gt; Nearly half (48%) of organizations have not identified the third-party systems or components that are most vulnerable in their software supply chains.&amp;nbsp; Many still rely on static questionnaires — time consuming, self-reported and poor at surfacing live risk — particularly for software components and managed providers.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/21446922"&gt;&lt;/div&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;How supervisors judge readiness:&lt;/strong&gt;&lt;/u&gt; Accountability doesn’t stop at the perimeter. Supervisors will look for a defensible method to judge supplier security (including secure development and vulnerability disclosure), contractual duties that mirror that method, ongoing visibility into partner risk (not just annual forms) and the ability to detect and respond when an originating exposure sits with a vendor.&lt;/p&gt;

&lt;p&gt;Article 21 makes this explicit: Supply chain security must be risk-based and proportionate. Software security in the supply chain should be a shared responsibility.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;Raise your security posture:&lt;/strong&gt;&lt;/u&gt; Start by matching the depth of your security requirements to the risk the supplier introduces to your environment.&lt;/p&gt;

&lt;p&gt;A cloud provider hosting critical workloads requires far more stringent controls than a low-impact SaaS tool. For high-risk vendors, demand tangible evidence — SBOM availability, patch and disclosure cadence, participation in coordinated vulnerability disclosure — and make these obligations enforceable in contracts.&lt;/p&gt;

&lt;p&gt;Replace one-off surveys with near-real-time indicators, such as exploit telemetry, remediation timeliness and changes in the supplier’s attack surface. Finally, rehearse a supplier-originating incident together: confirm contacts, evidence sharing and public communications that satisfy NIS2’s staged notifications.&lt;/p&gt;

&lt;h3&gt;4. Blind spots: The hidden risk you can’t manage&lt;/h3&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;The reality from Ivanti’s research:&lt;/strong&gt;&lt;/u&gt; Shadow IT, legacy systems, unmanaged devices and third-party dependencies are persistent blind spots for many organizations.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/21467845"&gt;&lt;/div&gt;

&lt;p&gt;These gaps slow response, obscure risk and leave organizations exposed to breaches and compliance failures.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;How supervisors judge readiness:&lt;/strong&gt;&lt;/u&gt; Article 21 expects organizations to manage risk across the lifecycle — including asset inventory, vulnerability management and supply chain assurance.&lt;/p&gt;

&lt;p&gt;Blind spots undermine that mandate. Supervisors will ask: can you prove you know what is in your environment, what’s vulnerable and what is being done about it?&lt;/p&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;Raise your security posture:&lt;/strong&gt;&lt;/u&gt; Treat visibility as a governance priority, not a technical detail.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Conduct regular attack surface assessments.&lt;/li&gt;
	&lt;li&gt;Integrate IT and security data.&lt;/li&gt;
	&lt;li&gt;Use automation to correlate and normalize asset information.&lt;/li&gt;
	&lt;li&gt;Flag shadow IT, BYOD and legacy systems for board-level review.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Most importantly, tie visibility gaps to business impact: “We lack patch compliance data for X% of endpoints, which affects SLA delivery and regulatory posture.”&lt;/p&gt;

&lt;h2&gt;Closing the communication gap: What CISOs and boards must do&lt;/h2&gt;

&lt;p&gt;Forty percent of security teams say IT doesn’t understand their organization’s risk tolerance — that’s a cybersecurity governance red flag. The board cannot challenge, prioritize or allocate resources without clarity on business impact.&lt;/p&gt;

&lt;p&gt;Under NIS2 regulations, the management body needs to exercise informed oversight. The remedy starts with the CISO translating exposures into scenarios the board recognizes:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;“If we do not update those systems within 48 hours, there’s a very high probability of breach, and the health data of all our clients will be easy to extract. This will hurt our brand, create claims in court and stop our services for days.”&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Strong briefings provide a time frame and tie investments to reductions in the top exposures (the exploits that would materially hurt revenue, safety or compliance).&lt;/p&gt;

&lt;p&gt;Boards should insist on a compact list of priorities, agree on risk appetite in economic terms and revisit progress quarterly. Over time, that discipline replaces tool-centric updates with a shared narrative of how the attack surface is shrinking and resilience is improving.&lt;/p&gt;

&lt;p&gt;Every board deck should answer these three simple questions:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;What could go wrong that truly matters?&lt;/li&gt;
	&lt;li&gt;What are we doing about it?&lt;/li&gt;
	&lt;li&gt;How will we know it worked?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Anchor measurement to outcomes — time to isolate, time to recover and changes in the top-ten exposures — rather than raw patch or alert counts. When discussing technical debt, attach a price tag: “Keeping this EOL cluster another quarter preserves functionality but adds €X expected loss unless we isolate and monitor it.” That is the language of governance NIS2 expects to see in minutes and in decisions.&lt;/p&gt;

&lt;h2&gt;Training the board: A NIS2 imperative&lt;/h2&gt;

&lt;p&gt;The board can only close the communications gap when they really know the subject. NIS2 codifies what many already recognize: the management body needs regular cybersecurity training to discharge its duties.&lt;/p&gt;

&lt;p&gt;Effective programs are pragmatic: They brief directors on evolving threats (such as AI-enabled ransomware and compromised software supply chains), clarify staged reporting and potential liabilities and practice decisions through realistic table-top exercises.&lt;/p&gt;

&lt;p&gt;Prioritize sessions that teach directors to read cyber metrics in business terms (e.g., what &lt;a href="https://www.ivanti.com/resources/research-reports/proactive-security"&gt;the exposure picture&lt;/a&gt; implies for continuity, customers and compliance) and how to interrogate the plan until it is credible.&lt;/p&gt;

&lt;p&gt;Turn training into capability. Make board education a continuous competency, not a one-off seminar. Use short, focused modules that build fluency (e.g., one quarter on exposure prioritization, the next on supplier oversight and CVD, then one on incident reporting mechanics).&lt;/p&gt;

&lt;p&gt;Base each session on a real scenario, like AI-assisted ransomware or a malicious vendor update and capture the specific decisions directors must make. Convert those decisions into concrete governance improvements (updated policies, contract clauses or metrics) so training shows traceable uplift rather than box-ticking.&lt;/p&gt;

&lt;h2&gt;Close the gap between intent and impact for NIS2-readiness&lt;/h2&gt;

&lt;p&gt;Ivanti’s research shows encouraging intent — boards talk about cybersecurity, budgets are growing and CISOs have a seat at the table. But, intent does not equal impact.&lt;/p&gt;

&lt;p&gt;That same data reveals preparedness gaps for ransomware, stubborn silos that slow response and weaken posture, a long tail of end-of-life technology and opaque supply chain risk that keeps material exposure on the books.&lt;/p&gt;

&lt;p&gt;NIS2 raises the bar from conversation to accountability: management bodies must ensure measures are proportionate, state of the art and effective — and they must prove it when incidents occur.&lt;/p&gt;

&lt;p&gt;Organizations that close the communication gap, retire or isolate legacy systems on a schedule and replace questionnaire-only oversight with evidence and rehearsal will find they are not only compliant, but resilient.&lt;/p&gt;
</description><pubDate>Mon, 29 Sep 2025 20:05:33 Z</pubDate></item><item><guid isPermaLink="false">986fd373-d81e-4498-8347-8c220a087cc8</guid><link>https://www.ivanti.com/blog/cyber-hygiene-definition-and-best-practices</link><atom:author><atom:name>Patrick Kaak</atom:name><atom:uri>https://www.ivanti.com/blog/authors/patrick-kaak</atom:uri></atom:author><category>Security</category><title>Basic Cyber Hygiene: New Definition and Best Practices for the Current World</title><description>&lt;p&gt;With the latest changes in regulations and laws, and with cyberattacks becoming more sophisticated, costly and frequent, it’s unavoidable: You must rethink basic cyber hygiene for your organization.&lt;/p&gt;

&lt;p&gt;Today, effective cyber hygiene requires you to plan and carry out regular and consistent actions to not only meet current challenges but also to keep pace with a threat landscape that is always evolving. The pivot to remote work, cloud computing and mobile devices created new openings for hackers, as will tomorrow’s developments in IoT and other technologies. What constituted basic cyber hygiene not very long ago no longer applies today.&lt;/p&gt;

&lt;h2&gt;A call for action: The NIS2 directive&lt;/h2&gt;

&lt;p&gt;The &lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555&amp;amp;qid=1707679389762" rel="noopener" target="_blank"&gt;NIS2&lt;/a&gt; (Network and Information System Security) directive of the EU urges every essential or important company to perform basic cyber hygiene, applying to entities in Europe and any businesses in the first tier of the digital supply chain of essential and important EU companies. EU and US authorities say they will &lt;a href="https://ec.europa.eu/commission/presscorner/detail/en/STATEMENT_24_576" rel="noopener" target="_blank"&gt;work together&lt;/a&gt; on cybersecurity frameworks for critical infrastructure, possibly leading to US adoption of parts of the directive.&lt;/p&gt;

&lt;p&gt;In recital 89 of the NIS2, Essential entities are asked to &lt;a href="https://www.ivanti.com/compliance/nis2-directive-compliance"&gt;adopt&lt;/a&gt; a wide array of basic cyber hygiene practices including zero-trust principles, network segmentation, access management training in cyberthreat awareness. They’re also &lt;a href="https://www.nis-2-directive.com/NIS_2_Directive_Preamble_81_to_90.html" rel="noopener" target="_blank"&gt;advised&lt;/a&gt; to pursue AI and machine learning technologies to bolster their capabilities.&lt;/p&gt;

&lt;p&gt;A few years ago, basic cyber hygiene meant creating and updating complex passwords, patching devices regularly, backing up data and deploying firewalls and endpoint virus scanners. People worked in-office, applications were hosted on-premises or on devices, data stayed in on-premises data centers, and vulnerabilities rarely occurred in operating systems and applications.&lt;/p&gt;

&lt;p&gt;Today, with hybrid work, there's a proliferation of devices connecting to applications hosted on-premises and in the cloud. Data is saved in multiple clouds and on-premises. More vulnerabilities are being exploited by more attackers.&lt;/p&gt;

&lt;p&gt;Therefore, we must understand current basic cyber hygiene best practices all IT administrators should employ and all users should follow – and the technologies that can be deployed to support them.&lt;/p&gt;

&lt;h2&gt;Passwords: From complexity to simplicity&lt;/h2&gt;

&lt;p&gt;Creating and remembering complex passwords can be challenging for users, especially for dozens of accounts. This can create “password fatigue,” a tendency to reuse or write down passwords or use easy to remember (and therefore easy to guess) ones. That opens doors for phishing, brute force and credential-stuffing attacks.&lt;/p&gt;

&lt;p&gt;IT personnel should recommend users use &lt;em&gt;password phrases&lt;/em&gt; instead. These are long, memorable sentences mixing words, numbers and symbols. "I love to eat pizza on Fridays!" is easy to remember but hard to crack, and more resistant to dictionary attacks employing likely words or combinations.&lt;/p&gt;

&lt;p&gt;Password phrases do not need to be regularly changed as often as passwords. Changing passwords too often can &lt;em&gt;reduce&lt;/em&gt; security, as users tend to make minor and predictable modifications or reuse them across accounts. Strong password phrases must be changed only if a breach or leak is suspected.&lt;/p&gt;

&lt;p&gt;IT teams can also introduce a password manager so users can generate, store and autofill their passwords and alert them if passwords are weak, reused or exposed in a data breach.&lt;/p&gt;

&lt;h2&gt;Device management: From protect most to protect all&lt;/h2&gt;

&lt;p&gt;Another cyber hygiene must: Keeping track of all devices connected to your network and ensuring security compliance. This way, administrators are not only protecting traditional devices like laptops, mobile devices, desktops and servers but others that might need access: printers, scanners, cameras, smart TVs or IoT devices.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Device management can be complex due to this increasing diversity of devices and the dynamic nature of networks. Some devices might belong to third parties (contractors, vendors, guests) not following your security practices.&lt;/p&gt;

&lt;p&gt;A &lt;a href="https://www.ivanti.com/products/discovery"&gt;24/7 asset discovery and inventory tool&lt;/a&gt; can automatically collect data about connected devices to help identify and classifying devices by providing information about their hardware, software, applications, databases and dependencies.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This helps administrators understand the relations among devices, data and applications and the potential network impact of a device failure or compromise. It can also help detect unauthorized, unmanaged or unsecured devices that may pose a risk, so you can take appropriate actions to remediate and manage them; these insights are essential to managing risk.&lt;/p&gt;

&lt;h2&gt;Patching: From delay to priority&lt;/h2&gt;

&lt;p&gt;Patching is essential to prevent hackers from exploiting software vulnerabilities, but can be daunting and time-consuming, especially for multiple devices and applications. Patches can cause compatibility issues, performance problems or errors, leading IT personnel to delay or ignore patching.&lt;/p&gt;

&lt;p&gt;Prioritize and automate patching by enabling automatic updates for system, applications and antivirus software. A patch management tool can scan, download and install patches and help schedule, monitor and report on patching activities and send alerts on missing or failed patches.&lt;/p&gt;

&lt;p&gt;Different patches have different installation priorities: Some should be installed in days or weeks; others can wait. Prioritize patches for critical systems that cannot auto-update immediately, or when more control and less disruption is necessary.&lt;/p&gt;

&lt;p&gt;Consider the likelihood of a vulnerability being exploited: Some vulnerabilities might have a high severity rating, but hackers may not use them as they are difficult to exploit or require specific conditions or user interaction. Some might have a lower severity rating but are widely exploited as they are easy to exploit or are used in automated attacks or malware campaigns.&lt;/p&gt;

&lt;p&gt;Assess compromise indicators and threat intelligence reports to know exploitation status and vulnerability type and frequency, then prioritize patches accordingly. For zero-day vulnerabilities, apply patches as soon as possible. Patch any vulnerabilities used in common attack vectors like phishing, credential stuffing, ransomware or those that affect critical systems or data.&lt;/p&gt;

&lt;p&gt;By focusing on the actuality of a vulnerability, you can reduce your exposure to cyber threats and optimize your patching process and resources.&lt;/p&gt;

&lt;h2&gt;Multi-factor authentication: From optional to mandatory&lt;/h2&gt;

&lt;p&gt;Multi-factor authentication (MFA) verifies identity using two or more factors, such as something you &lt;em&gt;know&lt;/em&gt; (e.g., password), something you &lt;em&gt;have&lt;/em&gt; (e.g., phone), or something you &lt;em&gt;are&lt;/em&gt; (e.g., fingerprint). This extra layer of online security prevents hackers from accessing accounts and services with just a password.&lt;/p&gt;

&lt;p&gt;However, many users still do not use MFA because they are unaware of its benefits or find it inconvenient. It can also cause MFA fatigue among users who must enter multiple codes, tokens or biometrics at login, leading to dissatisfaction, reduced productivity and increased support costs.&lt;/p&gt;

&lt;p&gt;Yet you must make MFA mandatory for all user accounts, especially those with access to sensitive or confidential data. To overcome MFA fatigue, IT administrators can also use a single sign-on (SSO) solution, letting users log in to multiple accounts and services with one username and password, reducing how often they need to enter credentials and MFA factors.&lt;/p&gt;

&lt;p&gt;Another way to improve security is bringing MFA to the next level and completely remove the password. By using &lt;a href="https://www.ivanti.com/products/passwordless-authentication"&gt;non-password authentication&lt;/a&gt; — biometrics and managed mobile devices only— you can eliminate password management and reduce the risk of phishing, brute force and credential-stuffing attacks.&lt;/p&gt;

&lt;h2&gt;Privilege: From excessive to minimal&lt;/h2&gt;

&lt;p&gt;Many users and applications have excessive or unnecessary privileges, increasing the attack surface and potential cyberattack damage. Users often have administrator privileges allowing them to install or remove software and change settings on devices, but these privileges are exploitable by malware, phishing or social engineering attacks. Plus, many applications have too many privileges, allowing hackers to access data and resources.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Follow the principle of &lt;em&gt;least privilege&lt;/em&gt;: Users and applications should have the minimum required to perform tasks. A privilege management solution can monitor, control and audit these privileges and help you enforce policies, grant or revoke privileges and detect and respond to suspicious or anomalous activities.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;One cyber hygiene best practice: Make everyone a &lt;em&gt;standard user&lt;/em&gt; — including administrators – with limited privileges, preventing them from installing, changing or removing software and settings on their devices. This reduces risk of malware, phishing or social engineering attacks while improving device performance.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Your admins should only use administrative accounts to perform certain tasks, such as patching, troubleshooting or configuration. These accounts are task-specific, available for a limited period, and are then automatically revoked or deleted.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Also, use a privilege elevation solution to let standard users temporarily gain higher privileges (after approval or verification) for a specific process or application. This avoids granting permanent or excessive privileges as they only have the ones they need when needed. One of the &lt;a href="https://www.ivanti.com/products/application-control"&gt;most popular&lt;/a&gt; lets you control and monitor device applications and grant or deny privileges based on policies, rules or context.&lt;/p&gt;

&lt;h2&gt;Zero trust: From assumption to verification&lt;/h2&gt;

&lt;p&gt;A &lt;a href="https://www.ivanti.com/network-security/zero-trust-security"&gt;zero-trust security model&lt;/a&gt; assumes no user, device or end user is trustworthy. Everything and everyone must be verified before getting access, as trust is a vulnerability and traditional security models are no longer effective in the era of cloud computing, mobile devices and remote work.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Many users and organizations still rely on outdated or security models – for example, virtual private networks. VPNs can also create security risks, such as exposing the entire network to a compromised device or allowing unauthorized access to network resources. Moreover, many users and organizations use software-as-a-service applications hosted and accessed online. SaaS applications can also create security risks, such as exposing sensitive data to third-party providers or allowing unauthorized access to application data.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To support a zero-trust approach, you can deploy a &lt;a href="https://www.ivanti.com/products/ivanti-neurons-zero-trust-access"&gt;zero-trust access solution&lt;/a&gt; to enforce policies, authenticate and authorize users and devices, encrypt and isolate data and traffic, and monitor and audit activities.&lt;/p&gt;

&lt;p&gt;On managed devices, an &lt;a href="https://www.ivanti.com/products/application-control"&gt;application control solution&lt;/a&gt; is usually set up to allow only known applications to run in your infrastructure. Unknown applications, like any downloaded by users or launched from USB drives or sticks, are blocked.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Another practice of Zero Trust is restricting the use of external devices, such as USB drives, printers, cameras or other external devices by using a software-based &lt;a href="https://www.ivanti.com/products/device-control"&gt;device control&lt;/a&gt;. This helps prevent data leakage, malware infections or unauthorized access by auditing outside devices connected to endpoints and servers and either blocking or allowing access and encrypting data being saved on external devices.&lt;/p&gt;

&lt;h2&gt;Security training: From awareness to action&lt;/h2&gt;

&lt;p&gt;Many users and organizations still fail to identify or avoid phishing, or report or escalate cyberincidents.&lt;/p&gt;

&lt;p&gt;Fortunately, it is easier than ever to address these deficiencies with regular and interactive security training. With security awareness software, IT teams can deliver and measure training programs that can cover the latest cyberthreats, trends and techniques, as well as the best cyber hygiene best practices and policies.&lt;/p&gt;

&lt;p&gt;A security awareness solution can help administrators create, customize and deliver engaging and relevant content to all users in the company, such as videos, quizzes, games or simulations, and track and evaluate organizational progress and performance.&lt;/p&gt;

&lt;h2&gt;Encryption: From optional to standard&lt;/h2&gt;

&lt;p&gt;Many organizations still should use encryption but are unaware of its benefits or find it complex or costly. Encryption can cause performance issues, compatibility problems or data loss if not correctly implemented or appropriately managed.&lt;/p&gt;

&lt;p&gt;By using encryption as a standard practice for your data and communication and by using a good, properly implemented and well-managed encryption solution, you will avoid the issues we’ve just mentioned while being able to choose, apply and manage the best encryption method for data and communication to ensure only authorized parties can access them.&lt;/p&gt;

&lt;h2&gt;Cyber hygiene is attainable with the right tools&lt;/h2&gt;

&lt;p&gt;Many of the established practices of cyber hygiene still apply, but we need to embrace new tools to keep pace with evolving challenges.&lt;/p&gt;

&lt;p&gt;For instance, virus scanners are still necessary, but AI is enriching their capabilities by quickly assessing data from multiple sources to drive action. We still need to make backups, but they should be saved in secure, non-connected places, immune from modification.&lt;/p&gt;

&lt;p&gt;Optimal cyber hygiene is within our grasp as long as we stay apprised of the latest tools and the best practices for using them well.&lt;/p&gt;
</description><pubDate>Thu, 06 Jun 2024 13:00:01 Z</pubDate></item><item><guid isPermaLink="false">23318a57-ffd6-4544-930e-a360966af18b</guid><link>https://www.ivanti.com/blog/5-reasons-why-nis2-directive-preparation-should-start-now-part-two-implementation-takes-time</link><atom:author><atom:name>Patrick Kaak</atom:name><atom:uri>https://www.ivanti.com/blog/authors/patrick-kaak</atom:uri></atom:author><category>Security</category><title>5 Reasons Why NIS2 Directive Preparation Should Start Now, Part Two: Implementation Takes Time</title><description>&lt;p&gt;In a previous blog post, I discussed the&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/5-reasons-why-nis2-directive-preparation-should-start-now-part-one-audits-take-time"&gt;two main areas to audit&lt;/a&gt;&amp;nbsp;before the European Union’s updated Network and Information Security Directive (NIS2) becomes ratified law in October 2024. Specifically, these audits would:&lt;/p&gt;

&lt;p&gt;Identify your gaps with the NIS2 directive’s requirements now.&lt;/p&gt;

&lt;p&gt;Review your current supply chain security flaws.&lt;/p&gt;

&lt;p&gt;Now that we’ve discovered these security flaws, we must fix them —&amp;nbsp;before&amp;nbsp;time runs out in October 2024.&lt;/p&gt;

&lt;p&gt;So, in this post, I’ll walk you through how to resolve your weakest security issues before the NIS2 Directive deadline hits by addressing these three key areas:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="#one"&gt;Inform&amp;nbsp;management about your cybersecurity gaps&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#two"&gt;Correctly implementing new organisation and technical security measures&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#three"&gt;Find time to train all of your employees&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;1. Inform management about your gaps – and get budget to remediate them&lt;/h2&gt;

&lt;p&gt;The NIS2 Directive&amp;nbsp;&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e3312-80-1" rel="noopener" target="_blank"&gt;imposes significant obligations&lt;/a&gt;&amp;nbsp;on organisations that fall under its scope, which may entail substantial costs and resources.&amp;nbsp;The Directive also introduces hefty fines and sanctions for non-compliance, up to a maximum of €10 million or 2% of an organisation's global annual revenue&amp;nbsp;(&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e4350-80-1" rel="noopener" target="_blank"&gt;Article 34&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;On top of this,&amp;nbsp;the new directive can extend liability&amp;nbsp;from entities to their individual representatives in certain situations. Moreover, when certain conditions are met, persons in management positions could be temporarily suspended (&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e3949-80-1" rel="noopener" target="_blank"&gt;Article 32-5b&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;Therefore, following the NIS2 Directive is&amp;nbsp;a &lt;strong&gt;legal necessity&lt;/strong&gt;&amp;nbsp;and&amp;nbsp;a &lt;strong&gt;strategic priority&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;To be in compliance, you must:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Inform your management&amp;nbsp;&lt;/strong&gt;about its implications and benefits and convince them to allocate sufficient budget and resources for implementing compliance.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Present a clear business case&lt;/strong&gt;&amp;nbsp;that outlines the risks of non-compliance, the opportunities of compliance and the return on investment.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Demonstrate how compliance&lt;/strong&gt; will enhance&amp;nbsp;your organisation's reputation, trustworthiness, competitiveness and resilience.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Informing management and getting a budget is a challenging task, requiring a persuasive and evidence-based argument that showcases the value of cybersecurity for your organisation.&lt;/p&gt;

&lt;p&gt;The sooner you start this process, the more time you’ll have to secure buy-in and support from management.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Possible business case benefits for NIS2 compliance&lt;/h3&gt;

&lt;p&gt;Some possible benefits that you can highlight in your business case are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Reducing operational costs&amp;nbsp;&lt;/strong&gt;by preventing or minimising cyberattack losses, such as downtime, data breaches, ransom payments, lawsuits and so on.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Increasing revenue&lt;/strong&gt;&amp;nbsp;by attracting or retaining customers who value security, privacy, quality, et cetera.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Improving efficiency&lt;/strong&gt;&amp;nbsp;by streamlining processes, enhancing performance, reducing errors, etc.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Innovating&lt;/strong&gt;&amp;nbsp;by adopting new technologies, developing new products or services, creating new markets and more.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Following other cybersecurity regulations or standards&amp;nbsp;beyond NIS2&lt;/strong&gt;&amp;nbsp;– such as&amp;nbsp;&lt;a href="https://commission.europa.eu/law/law-topic/data-protection/data-protection-eu_en" rel="noopener" target="_blank"&gt;GDPR&lt;/a&gt;,&amp;nbsp;&lt;a href="https://www.iso.org/standard/27001" rel="noopener" target="_blank"&gt;ISO 27001&lt;/a&gt;,&amp;nbsp;&lt;a href="https://listings.pcisecuritystandards.org/documents/PCI_DSS-QRG-v3_2_1.pdf" rel="noopener" target="_blank"&gt;PCI DSS&lt;/a&gt;&amp;nbsp;and others&amp;nbsp;&amp;nbsp;– since global frameworks often have a high overlap with the compliance requirements of NIS2.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Potential information sources for justifying your NIS2 compliance business case&lt;/h3&gt;

&lt;p&gt;Some sources you can use to support your business case are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Statistics or facts&lt;/strong&gt;&amp;nbsp;showing the prevalence, impact or cost of cyberattacks in your sector or region.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Case studies or examples&lt;/strong&gt;&amp;nbsp;illustrating how other organisations have benefited from complying with the NIS2 Directive or similar regulations. For example, the&amp;nbsp;Enisa NIS Investments 2022 report&amp;nbsp;shows that for 62% of the organisations implementing the older NIS directive, such implementations helped them detect security incidents; for 21%, implementations helped during security incident recovery.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Testimonials or feedback&lt;/strong&gt;&amp;nbsp;from customers, partners, regulators or experts who endorse or recommend complying with the NIS2 Directive or similar regulations.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Benchmarks or indicators&lt;/strong&gt;&amp;nbsp;revealing your current or projected cybersecurity performance or progress in relation to the NIS2 Directive or your competitors.&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/resources/v/doc/ivi/2702/fa749d5d96a9" target="_blank"&gt;Ivanti’s 2023 Cyberstrategy Tool Kit for Internal Buy-In&lt;/a&gt;&amp;nbsp;is also a great resource that explains time-to-functionality and cost, how a solution helps defend against certain types of cyberattacks, and how to react to and overcome common objections.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;General business benefits of NIS2 Directive compliance&lt;/h3&gt;

&lt;p&gt;Some of the benefits of complying with the NIS2 Directive include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Reducing operational costs&lt;/strong&gt; by preventing or minimising cyberattack losses, such as downtime, data breaches, ransom payments, lawsuits, et cetera. &lt;a href="https://www.ibm.com/reports/data-breach" rel="noopener" target="_blank"&gt;According to a report by IBM&lt;/a&gt;, the average cost of a data breach in 2022 was US$4.82 million for critical infrastructure organisations and the average time to identify and contain a breach was 277 days. If you are taking measures to comply with the NIS2 Directive, the average time spent identifying and containing a breach will be much shorter, and costs of the attack will be lower.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Increasing revenue&lt;/strong&gt;&amp;nbsp;by attracting or retaining customers who value security, privacy, quality and similar factors. According to&amp;nbsp;&lt;a href="https://www.fisglobal.com/-/media/fisglobal/worldpay/docs/insights/consumer-intelligence-series-protectme.pdf" rel="noopener" target="_blank"&gt;a survey by PwC&lt;/a&gt;, 87% of consumers say they will take their business elsewhere if they don't trust a company's data practices, and 71% of consumers say they would stop using a company's products or services if they found out it was sharing their data without their permission, which could happen with a data leak.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Improving efficiency&lt;/strong&gt;&amp;nbsp;by streamlining processes, enhancing performance, reducing errors and so on.&amp;nbsp;&lt;a href="https://www.accenture.com/us-en/insights/security/state-cybersecurity" rel="noopener" target="_blank"&gt;Accenture&lt;/a&gt; has found that&amp;nbsp;companies that adopt advanced security technologies can reduce the cost of cybercrime by up to 48%.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Complying with other regulations or standards&lt;/strong&gt;&amp;nbsp;that require cybersecurity, such as GDPR, ISO 27001, PCI DSS or others.&amp;nbsp;&lt;a href="https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/dpbs-2019.pdf" rel="noopener" target="_blank"&gt;Cisco&lt;/a&gt;&amp;nbsp;points out that 97% of organisations that follow GDPR see benefits such as gaining competitive advantage, achieving operational efficiency and reducing sales delays.&amp;nbsp;Similar results are probably achievable by following NIS2.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;When it comes to budgeting,&amp;nbsp;the proposal for a directive by the European Commission&amp;nbsp;(&lt;a href="https://ec.europa.eu/info/law/better-regulation/have-your-say/initiatives/12475-Cybersecurity-review-of-EU-rules-on-the-security-of-network-and-information-systems_en" rel="noopener" target="_blank"&gt;Anex 7 - 1.4.3&lt;/a&gt;)&amp;nbsp;mentions that for&amp;nbsp;companies&amp;nbsp;falling under the scope of the NIS2 framework, it’s estimated they would need an increase of a maximum 22% of their current ICT security spending for the first years following the introduction of the NIS2 framework.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;However, the proposal also mentions that this average increase of ICT security spending would lead to&amp;nbsp;a &lt;strong&gt;proportionate benefit&amp;nbsp;&lt;/strong&gt;from such investments, notably due to a considerable reduction in cost of cybersecurity incidents.&lt;/p&gt;

&lt;h2 id="two"&gt;2. Correctly implement new organisational and technical security measures&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;After researching the gaps and obtaining a budget, it’s time to close those gaps. The NIS2 Directive requires companies to implement appropriate organisational and technical measures to manage their cybersecurity risks and ensure a high level of security across their networks and information systems.&lt;/p&gt;

&lt;p&gt;These measures include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Adopting policies and procedures&lt;/strong&gt;&amp;nbsp;for risk management, incident response, business continuity, data protection, et cetera.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Establishing roles and responsibilities&lt;/strong&gt;&amp;nbsp;for cybersecurity governance, oversight, coordination and other areas.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Providing training and awareness programs&lt;/strong&gt; for staff, management, customers, etc.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing basic cyber hygiene&lt;/strong&gt;&amp;nbsp;such as encryption, authentication (MFA), firewalls, antivirus software, patching, zero trust access and so on.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Conducting&lt;/strong&gt;&amp;nbsp;regular testing, monitoring, auditing and other measures.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Implementing those organisational and technical measures isn't a one-off or static task. It requires&amp;nbsp;&lt;strong&gt;establishing a continuous and dynamic process&lt;/strong&gt;&amp;nbsp;that adapts to changing threats, technologies, regulations and business needs.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;So, the same advice applies for this process as for the other points we’ve already covered: the sooner you start, the more time you'll have to implement the necessary measures and ensure their effectiveness and efficiency.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;I would advise starting implementation&amp;nbsp;at least&amp;nbsp;in January 2024, so you’re ready before the summer holidays.&lt;/p&gt;

&lt;h3&gt;Next steps for NIS2 Directive implementations&lt;/h3&gt;

&lt;p&gt;Some possible steps that you can take to implement organisational and technical measures are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Developing and implementing&lt;/strong&gt; &lt;strong&gt;a risk-based management process&lt;/strong&gt;&amp;nbsp;that defines your objectives, scope, roles, responsibilities, resources, timelines and metrics for managing your cybersecurity risks.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing a security policy&lt;/strong&gt;&amp;nbsp;that establishes your principles, guidelines, standards and procedures for ensuring the security of your network and information systems.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Conducting risk assessments&lt;/strong&gt; to identify your assets, threats, vulnerabilities, impacts and likelihoods of cyberattacks; and prioritising your actions based on your risk appetite and tolerance.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing security controls&lt;/strong&gt;&amp;nbsp;that protect your network and information systems from unauthorised access, use, disclosure, modification or destruction. These controls can be classified into three categories: preventive (e.g., encryption); detective, detective&amp;nbsp;&amp;nbsp;(e.g., monitoring), and corrective (e.g., backup).&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing an incident response&lt;/strong&gt; &lt;strong&gt;plan&lt;/strong&gt;&amp;nbsp;that defines your processes, roles, responsibilities, resources, tools and communication channels for responding to cyberincidents effectively and efficiently.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing a business continuity plan&lt;/strong&gt;&amp;nbsp;that defines your processes, roles, responsibilities, resources, tools and communication channels for maintaining or restoring your critical business processes during a cyber-related disruption or disaster.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing a review and improvement plan&lt;/strong&gt;&amp;nbsp;that defines your processes, roles, responsibilities, resources, tools and communication channels for regularly evaluating, reporting and enhancing your cybersecurity measures.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing the technical controls&lt;/strong&gt; for asset management and &lt;a href="https://www.ivanti.com/blog/cyber-hygiene-definition-and-best-practices"&gt;&lt;strong&gt;basic cyber hygiene&lt;/strong&gt;&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The Directive’s reference to ‘basic cyber hygiene’ is a bit vague in&amp;nbsp;&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e3337-80-1" rel="noopener" target="_blank"&gt;Article 21&lt;/a&gt;, so we’ll dive into this in another blog post. For now, think about basic security measures such as:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;MFA.&lt;/li&gt;
	&lt;li&gt;Patching your OS and applications as quickly as possible.&lt;/li&gt;
	&lt;li&gt;Securing network connections on public networks.&lt;/li&gt;
	&lt;li&gt;Encryption of all drives (especially removable ones.)&lt;/li&gt;
	&lt;li&gt;Privilege management and education of all employees.&lt;/li&gt;
	&lt;li&gt;Subscribing to channels that give you information about the latest patches and priorities, like&amp;nbsp;Ivanti’s Patch Tuesday webinars.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id="three"&gt;3. Fix the weakest link: find time to train every employee&lt;/h2&gt;

&lt;p&gt;The NIS2 Directive recognises that human factors are crucial for cybersecurity and that employees are often&amp;nbsp;the &lt;strong&gt;weakest link&lt;/strong&gt;&amp;nbsp;— as well as the first line of defense – in preventing or detecting cyberattacks.&lt;/p&gt;

&lt;p&gt;The Directive requires organisations to &lt;strong&gt;provide&amp;nbsp;adequate training and awareness programs&lt;/strong&gt;&amp;nbsp;for their employees, users of digital services and other stakeholders on cybersecurity issues.&lt;/p&gt;

&lt;p&gt;Training all your employees is not a sporadic or optional task. It requires a regular and comprehensive program that covers topics such as:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Basic cybersecurity concepts and terminology.&lt;/li&gt;
	&lt;li&gt;Common cyberthreats and attack vectors.&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/cyber-hygiene-definition-and-best-practices"&gt;Best practices and tips for cyber hygiene&lt;/a&gt;.&lt;/li&gt;
	&lt;li&gt;Cybersecurity policies and procedures, made relevant and simplified for end users.&lt;/li&gt;
	&lt;li&gt;Every user’s role and responsibilities for organisational cybersecurity.&lt;/li&gt;
	&lt;li&gt;How to report and respond to incidents.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It is important to note that this training&amp;nbsp;&lt;strong&gt;should be received by everyone&lt;/strong&gt;&amp;nbsp;within the company, not only by IT employees. Even management should undergo this training.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;A survey conducted for Ivanti&amp;nbsp;shows that a lot of employees are not even aware of mandatory cybersecurity training.&amp;nbsp;Just 27% of them feel “very prepared” to recognise and report threats like malware and phishing at work. 6% of them feel “very prepared” to recognize and report threats like malware and phishing at work.&lt;/p&gt;

&lt;p&gt;In&amp;nbsp;&lt;a href="https://www.enisa.europa.eu/publications/nis-investments-2022" rel="noopener" target="_blank"&gt;Enisa’s NIS Investments 2022 report&lt;/a&gt;, Enisa mentions that&amp;nbsp;40% of the surveyed OES (Operators of Essential Services) have no security awareness program for non-IT staff.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;It is important to monitor who has&amp;nbsp;not&amp;nbsp;been trained yet and act on it. Training all your employees is not only beneficial for compliance but also for productivity, quality, innovation and customer satisfaction.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The best NIS2 advice we can give&lt;/h2&gt;

&lt;p&gt;The NIS2 Directive is landmark legislation that aims to enhance the cybersecurity of critical sectors in the EU. It imposes significant obligations on organisations that fall under its scope, along with hefty fines and sanctions for non-compliance.&lt;/p&gt;

&lt;p&gt;Following the NIS2 Directive is a complex task. It demands&amp;nbsp;&lt;strong&gt;a proactive and comprehensive approach&lt;/strong&gt;&amp;nbsp;involving multiple steps,&amp;nbsp;stakeholders&amp;nbsp;and resources.&lt;/p&gt;

&lt;p&gt;The sooner you start preparing for it, the better prepared you will be when it becomes effective in October 2024.&lt;/p&gt;

&lt;p&gt;The best advice we can offer?&amp;nbsp;&lt;strong&gt;Do&amp;nbsp;not&amp;nbsp;wait till then: start&lt;/strong&gt;&amp;nbsp;preparing for the NIS2 Directive now!&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
</description><pubDate>Mon, 28 Aug 2023 17:43:02 Z</pubDate></item><item><guid isPermaLink="false">5ce195e7-9e65-409f-be30-47f482f0d5db</guid><link>https://www.ivanti.com/blog/5-reasons-why-nis2-directive-preparation-should-start-now-part-one-audits-take-time</link><atom:author><atom:name>Patrick Kaak</atom:name><atom:uri>https://www.ivanti.com/blog/authors/patrick-kaak</atom:uri></atom:author><category>Security</category><title>5 Reasons Why NIS2 Directive Preparation Should Start Now, Part One: Audits Take Time</title><description>&lt;p&gt;You probably heard about the European Union’s updated Network and Information Security Directive (NIS2). This directive will translate into active law in October 2024. You should be ready for it, as there are high fines and sanctions for non-compliance.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;But you might be tempted to think that October 2024 is far away, right?&amp;nbsp;Think twice.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;After all, how can you know if you have plenty of time to prepare&amp;nbsp;if you don’t know how well you currently comply&amp;nbsp;with the projected regulations?&lt;/p&gt;

&lt;p&gt;So, between now and October 2024, you must audit your current cybersecurity status. Specifically:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;&lt;a href="#one"&gt;Identify gaps in meeting the NIS2 directive’s requirements, starting now&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#two"&gt;Review your current supply chain security flaws&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;In the second part of this series, I’ll review&amp;nbsp;&lt;em&gt;the &lt;a href="https://www.ivanti.com/blog/5-reasons-why-nis2-directive-preparation-should-start-now-part-two-implementation-takes-time"&gt;three areas you’ll need to address to fix&amp;nbsp;the gaps your audits uncover&lt;/a&gt;&lt;/em&gt;&amp;nbsp;— including how to:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Inform management about your cybersecurity gaps.&lt;/li&gt;
	&lt;li&gt;Implement new organizational and technical security measures correctly.&lt;/li&gt;
	&lt;li&gt;Find time to train all of your employees.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2 id="one"&gt;1. Identify gaps in meeting the NIS2 Directive's requirements, starting now&lt;/h2&gt;

&lt;p&gt;The&amp;nbsp;&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32022L2555" rel="noopener" target="_blank"&gt;NIS2 Directive&lt;/a&gt; is the EU-wide legislation on cybersecurity that provides legal measures to boost the overall level of cybersecurity in the EU. It modernises the existing legal framework to keep up with increased digitization and an evolving cybersecurity threat landscape.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The directive&amp;nbsp;&lt;a href="https://www.europarl.europa.eu/thinktank/en/document/EPRS_BRI(2021)689333" rel="noopener" target="_blank"&gt;expands the scope of the cybersecurity rules&lt;/a&gt;&amp;nbsp;to new sectors and entities, improving the resilience and incident response capacities of public and private entities, competent authorities and the entire EU.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The NIS2 directive outlines increased measures for resilience against cyberattacks to minimize vulnerabilities and improve cyberdefense.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To comply with the NIS2 Directive, you must:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Assess&amp;nbsp;&lt;/strong&gt;your cybersecurity posture&amp;nbsp;and identify any gaps or weaknesses that may expose you to cyber risks.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Map&lt;/strong&gt;&amp;nbsp;your existing policies, procedures and controls to the directive's requirements and see where to improve or update them.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Evaluate&lt;/strong&gt;&amp;nbsp;your incident response capabilities and reporting mechanisms and ensure they align with the directive's standards.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A big problem with the NIS2 is that it tells you what you&amp;nbsp;should&amp;nbsp;do, but not&amp;nbsp;how&amp;nbsp;you should do it. Luckily, multiple frameworks can help you with the how, including:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://www.nist.gov/cyberframework" rel="noopener" target="_blank"&gt;NIST CSF (Cybersecurity Framework)&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;The&amp;nbsp;&lt;a href="https://www.iso.org/standard/27001" rel="noopener" target="_blank"&gt;ISO27001&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://www.iso.org/standard/75652.html" rel="noopener" target="_blank"&gt;ISO27002&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.cisecurity.org/controls" rel="noopener" target="_blank"&gt;CIS Controls&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.isa.org/standards-and-publications/isa-standards/isa-iec-62443-series-of-standards" rel="noopener" target="_blank"&gt;IEC 62443&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In Belgium, the&amp;nbsp;&lt;a href="https://ccb.belgium.be/en/cyberfundamentals-framework" rel="noopener" target="_blank"&gt;CCB has created a Cyberfundamentals Framework&lt;/a&gt;&amp;nbsp;based on multiple frameworks with references to how the different parts of the frameworks relate to the GDPR and NIS2.&lt;/p&gt;

&lt;p&gt;After selecting the framework,&amp;nbsp;&lt;strong&gt;you must identify gaps&lt;/strong&gt;&amp;nbsp;in relation to the chosen framework and the directive's requirements. Identifying gaps is not a simple or quick task; it requires a thorough and systematic analysis of your organization's cybersecurity maturity and readiness.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;You not only need to check your cybersecurity strategy and policies, but you also need to do a risk analysis to find the most critical assets and the cybersecurity risks they present, then consider security controls to bring down the risk score of those vital assets.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The sooner you start this process, the more time you’ll have&lt;/strong&gt;&amp;nbsp;to obtain the budget needed to address any issues and implement any necessary changes.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Possible NIS2 environment gaps&lt;/h3&gt;

&lt;p&gt;Some possible gaps that you may encounter in your environment are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Lack of a comprehensive cybersecurity strategy or policy&lt;/strong&gt;&amp;nbsp;that covers all aspects of risk management, incident response, business continuity, data protection, etc.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of a dedicated cybersecurity team or function&lt;/strong&gt;&amp;nbsp;that oversees, coordinates and monitors all cybersecurity activities and initiatives across the organization.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of adequate security controls or measures&lt;/strong&gt;&amp;nbsp;for protecting your network and information systems from unauthorized access, use, disclosure, modification or destruction.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of regular testing or auditing&lt;/strong&gt;&amp;nbsp;of your security controls or measures to ensure their effectiveness and compliance with the directive's requirements.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of proper training or awareness programs&lt;/strong&gt;&amp;nbsp;for your staff, management, other employees or other stakeholders on cybersecurity issues and best practices.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of clear communication or reporting channels&lt;/strong&gt;&amp;nbsp;for notifying relevant authorities or parties of any incidents or breaches that affect your services.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Potential security solutions for your environment to comply with NIS2&lt;/h3&gt;

&lt;p&gt;To identify and fix these security gaps, you can:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Run gap analysis frameworks or models&lt;/strong&gt;&amp;nbsp;that help you compare your current state with your desired state and identify areas for improvement.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implement cybersecurity maturity models or standards&lt;/strong&gt;&amp;nbsp;that help you measure your level of cybersecurity performance and progress.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Conduct a risk assessment&lt;/strong&gt;&amp;nbsp;to identify your assets, threats, vulnerabilities, impacts and likelihoods of cyberattacks.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Request external audits or assessments&lt;/strong&gt;&amp;nbsp;that help you validate your compliance status and identify any weaknesses or deficiencies.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id="two"&gt;2. Review current supply chain security flaws with enough time to coordinate action with suppliers&lt;/h2&gt;

&lt;p&gt;The NIS2 Directive also&amp;nbsp;introduces new provisions on supply&amp;nbsp;chain security&amp;nbsp;(&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e40-80-1" rel="noopener" target="_blank"&gt;chapter 0, point 54, 56&lt;/a&gt;), recognizing that cyber threats can originate from third-party providers or subcontractors.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The directive&amp;nbsp;requires organizations to ensure that their suppliers follow&amp;nbsp;appropriate security standards and practices&amp;nbsp;(&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e3337-80-1" rel="noopener" target="_blank"&gt;article 21-2d&lt;/a&gt;) and regularly monitor their performance and compliance (&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e3337-80-1" rel="noopener" target="_blank"&gt;article 21–3&lt;/a&gt;).&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This isn't without reason.&amp;nbsp;&lt;strong&gt;Supply chain attacks are on the rise&lt;/strong&gt;:&lt;/p&gt;

&lt;p&gt;In&amp;nbsp;&lt;a href="https://www.blackberry.com/us/en/company/newsroom/press-releases/2022/blackberry-commissioned-research-reveals-four-in-five-software-supply-chains-exposed-to-cyberattack-in-the-last-12-months" rel="noopener" target="_blank"&gt;BlackBerry research&lt;/a&gt;&amp;nbsp;with over 1500 IT decision-makers in 2022, four-fifths of respondents said they had been notified of an attack or vulnerability in their supply chain within the year. Seventy-seven percent said they uncovered hidden participants in their software supply chain that they weren't previously aware of.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.accenture.com/_acnmedia/PDF-116/Accenture-Cybersecurity-Report-2020.pd" rel="noopener" target="_blank"&gt;Accenture research&lt;/a&gt;&amp;nbsp;also reveals&amp;nbsp;40% of security breaches are indirect, occurring through the supply chain.&lt;/p&gt;

&lt;p&gt;Therefore,&amp;nbsp;&lt;strong&gt;securing your supply chain is essential&lt;/strong&gt;&amp;nbsp;for ensuring business continuity, resilience, reputation and trust.&lt;/p&gt;

&lt;p&gt;But in Ivanti’s&amp;nbsp;&lt;a href="/resources/v/doc/ivi/2732/7b4205775465" target="_blank"&gt;&lt;em&gt;Press Reset: A 2023 Cybersecurity Status Report&lt;/em&gt;&lt;/a&gt;,&amp;nbsp;we found that&amp;nbsp;only 42%&amp;nbsp;of the over 1,300 executive leaders and security professionals surveyed said they're prepared to safeguard against supply chain threats, even though 46% call it a high-level threat.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Supply chain threats not only come via attacks&amp;nbsp;on solution providers like&amp;nbsp;&lt;a href="https://www.theverge.com/2022/3/22/22990637/okta-breach-single-sign-on-lapsus-hacker-group" rel="noopener" target="_blank"&gt;Okta&lt;/a&gt;,&amp;nbsp;&lt;a href="https://techcrunch.com/2021/07/05/kaseya-hack-flood-ransomware/" rel="noopener" target="_blank"&gt;Kaseya&lt;/a&gt;&amp;nbsp;or&amp;nbsp;&lt;a href="https://www.techtarget.com/whatis/feature/SolarWinds-hack-explained-Everything-you-need-to-know" rel="noopener" target="_blank"&gt;SolarWinds&lt;/a&gt;, but also through partners either directly connected to your IT infrastructure or who can log into it.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;And don’t forget about attacks on your resource suppliers that may cripple them so they're unable to deliver certain resources you need for your own operations. You have to be prepared and&amp;nbsp;&lt;strong&gt;have backup vendors available&lt;/strong&gt;&amp;nbsp;who can supply those resources if your primary supplier is out of action due to a cyberattack or other cause.&lt;/p&gt;

&lt;p&gt;Supply chain security is a complex and challenging issue involving multiple actors, dependencies and interconnections — and cannot be achieved overnight.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;You need to:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Establish clear and transparent communication channels&lt;/strong&gt;&amp;nbsp;with your suppliers and define your expectations and obligations regarding cybersecurity.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Conduct regular audits and assessments&lt;/strong&gt;&amp;nbsp;of your suppliers' security practices and verify that they meet the directive's requirements.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Establish contingency plans and backup solutions&lt;/strong&gt;&amp;nbsp;in case of a disruption or compromise of your supply chain.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Furthermore, you must start engaging with your suppliers&amp;nbsp;&lt;strong&gt;as soon as possible&lt;/strong&gt;&amp;nbsp;and work together with them to ensure your supply chain is secure and resilient.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Supply chain security challenges for NIS2&lt;/h3&gt;

&lt;p&gt;Some possible challenges that you may face in securing your supply chain are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Lack of visibility or transparency&lt;/strong&gt;&amp;nbsp;into your suppliers' security practices, policies, or incidents.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of trust or cooperation&lt;/strong&gt;&amp;nbsp;among your suppliers or between you and your suppliers.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of consistency or alignment&lt;/strong&gt;&amp;nbsp;in security standards, requirements, or expectations across your supply chain.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of resources or capabilities&lt;/strong&gt;&amp;nbsp;to monitor, audit or verify your suppliers' security performance or compliance.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of contingency plans or backup solutions&lt;/strong&gt;&amp;nbsp;to mitigate or recover from any disruptions or compromises of your supply chain.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of information&lt;/strong&gt;&amp;nbsp;as to what you expect from your supplier’s security practices.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Supply chain security solutions for NIS2&lt;/h3&gt;

&lt;p&gt;To overcome these supply chain security challenges, you can:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Establish clear contracts or agreements&lt;/strong&gt;&amp;nbsp;with your suppliers that specify their security obligations, responsibilities and liabilities.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Develop common security criteria, guidelines or frameworks&lt;/strong&gt;&amp;nbsp;that apply to all suppliers in your supply chain and align with the directive's requirements.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implement security controls, measures or tools&lt;/strong&gt;&amp;nbsp;that enable you to track, monitor or verify your suppliers' security activities, incidents or compliance status.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Create joint security teams, committees or forums&lt;/strong&gt;&amp;nbsp;that facilitate information sharing, collaboration and coordination among your suppliers or between you and your suppliers.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Build trust and mutual understanding&lt;/strong&gt;&amp;nbsp;with your suppliers through regular communication, feedback&amp;nbsp;and recognition.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;When your NIS2 Directive audits are complete, now what?&lt;/h2&gt;

&lt;p&gt;Now that you’ve determined where you currently stand in relation to the NIS2 Directive, it’s time to implement critical changes to ensure compliance by October 2024. I’m certain that addressing the gaps that your audits identified will require all the time you have — and then some! – before the regulations are officially implemented in your country.&lt;/p&gt;

&lt;p&gt;But how can you systematically address these gaps in a timely fashion? We discuss&amp;nbsp;&lt;em&gt;the &lt;a href="https://www.ivanti.com/blog/5-reasons-why-nis2-directive-preparation-should-start-now-part-two-implementation-takes-time"&gt;three areas of security changes you’ll need for NIS2&lt;/a&gt;&lt;/em&gt; in our next blog post, as we examine how to:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Inform management about your cybersecurity gaps.&lt;/li&gt;
	&lt;li&gt;Correctly implement new organization and technical security measures.&lt;/li&gt;
	&lt;li&gt;Find time to train all of your employees.&lt;/li&gt;
&lt;/ol&gt;
</description><pubDate>Mon, 28 Aug 2023 17:14:55 Z</pubDate></item><item><guid isPermaLink="false">608134e7-24a8-462b-9d18-ed5e00911297</guid><link>https://www.ivanti.com/blog/how-to-use-the-new-ivanti-security-controls-isec-connector-for-automation</link><atom:author><atom:name>Patrick Kaak</atom:name><atom:uri>https://www.ivanti.com/blog/authors/patrick-kaak</atom:uri></atom:author><category>Security</category><title>How to Use the New Ivanti Security Controls (ISeC) Connector for Automation</title><description>&lt;p&gt;Ivanti released the new &lt;a href="https://www.ivanti.com/products/security-controls" target="_blank"&gt;Ivanti Security Controls (ISeC)&lt;/a&gt; connector for &lt;a href="https://www.ivanti.com/products/automation" target="_blank"&gt;Automation&lt;/a&gt; in the beginning of July. This makes it possible to use Automation to create advanced tasks for patching.&lt;img alt="automation screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/08/automation.png"&gt;&lt;/p&gt;

&lt;p&gt;Think about patching a cluster of machines, where you first want to disconnect a machine from the cluster, patch it, reboot and test the machine and put it back into the cluster before going to the next machine. If patching goes bad, the machine should stay out of the cluster and an administrator should be notified.&lt;/p&gt;

&lt;p&gt;Or using &lt;a href="https://www.ivanti.com/products/user-workspace-manager" target="_blank"&gt;Identity&lt;/a&gt; to give the power to patch a system to application administrators, so they can scan, patch and reboot their server when they are ready without giving them administrative rights on the server. In this blog we will bring you up to speed with this new connector.&lt;/p&gt;

&lt;p&gt;In this blog we assume you already have installed and configured Ivanti Automation and Ivanti Security Controls and that you have a basic understanding how these products work as we are not doing a step-by-step walkthrough. You first have to download the connector from the &lt;a href="https://marketplace.ivanticloud.com/packages/Ivanti.Security.Controls.Connector/" target="_blank" rel="noopener"&gt;Ivanti Marketplace&lt;/a&gt; and install it in your Automation Environment. After this, create an Active Directory user account that Automation will be using to connect to the ISeC REST API.&lt;/p&gt;

&lt;p&gt;Next step is setting up Ivanti Security Controls so we can successfully run tasks by leveraging the REST API. Configure the following requirements in the ISeC Console:&lt;img alt="define credentials" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/08/automation2.png"&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Create a new credential for use by Automation at Tools -&amp;gt; Credentials. Those are needed for the REST API to start the scan and deployment and are being used to connect to the systems being patched. Notice the &lt;u&gt;name&lt;/u&gt;, as you need it later.&lt;/li&gt;
	&lt;li&gt;If you run the Automation tasks on another Automation agent than the one where the ISeC console is installed on, you need to run the PowerShell script that is provided at Tools -&amp;gt; Options -&amp;gt; API on the server with the Automation agent installed, so it can connect to the ISeC REST API.&lt;/li&gt;
	&lt;li&gt;If you use User Role Assignment, you need to give the ‘create Active Directory user access’ to the ISeC console.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;After setting up ISeC, we can create an Automation module to Scan a device. Open the Ivanti Automation console and create a new module. Add the task ‘Ivanti Security Controls – Patch Scan’-Start (it can be found in the Security-node). The first time you add an ISeC task it will ask you for some information to set the global variables. Use the Active Directory user account you created earlier as ISeC Serviceaccount. Set the ISeC server name (the machine with the ISeC console installed) and use port number 3121.&lt;img alt="settings - new global variables" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/08/automation3.png"&gt;&lt;/p&gt;

&lt;p&gt;Next step is setting the Task settings. The required settings are:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Scan Type: Set this to device&lt;img alt="task settings" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/08/automation4.png"&gt;&lt;/li&gt;
	&lt;li&gt;Device name: right click in the value field and choose Insert Parameters -&amp;gt; AutoCreate parameter [Device name]&lt;/li&gt;
	&lt;li&gt;PatchTemplate name: WUScan (this is a builtin template. You can use another Patch Scan Template name)&lt;/li&gt;
	&lt;li&gt;Credentials Name: set this to the credentials created earlier.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The rest of the Task settings can be left default.&lt;/p&gt;

&lt;p&gt;Last part is setting the result of the task into parameters.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Exitcode is being used to return a Finished without Errors (0) or Finished with Errors (1 or higher number) back to Automation.&lt;/li&gt;
	&lt;li&gt;PatchScanID will have the value of the internal ID for the Patch Scan given by ISeC. As it is needed in the other tasks we will add, this one is required to set. This can be done by selecting AutoCreate parameter [PatchScanID]&lt;img alt="assign task result" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/08/automation5.png"&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;After this, click OK to go back to the module you are creating. The Start Patch Scan task will only start the agentless scan of a device and returns only the ID. It will not wait till the scan is ready or report anything else back. For this we need to add some other tasks.&lt;/p&gt;

&lt;p&gt;Add the ‘Ivanti Security Controls – Patch Scan’-Wait task. In the Task Settings-tab add the earlier created PatchScanID-parameter as input. You can leave the rest of the settings to their defaults. This task lets Automation wait till the scan of the device is finished before going any further. You can put the result of the task into parameters, but this is not required.&lt;/p&gt;

&lt;p&gt;&lt;img alt="ivanti secuirty controls - patch scan" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/08/automation6.png"&gt;&lt;/p&gt;

&lt;p&gt;The last step is to get the results of the scan, so we know if and how many patches are missing on the machine. Add the task ‘Ivanti Security Controls – Patch Scan’-Result to the module. Insert the PatchScanID-parameter to the task settings. The rest can be left to the default settings. Set the task result ‘ResultPatchScan’ to a new parameter by using the AutoCreate parameter function.&lt;/p&gt;

&lt;p&gt;You have now created a module with 3 tasks in it, that will scan a device and put the report about missing patches in a parameter. Right click on the module to schedule it. Select the machine with the Automation agent that will communicate with the ISeC API and in the Job Parameters set the name of the device you want to scan. Hit the OK-button to run the tasks in the module.&lt;img alt="automation - new job scan" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/08/automation7.png"&gt;After the module has run, you can find the results in the module parameter that you created to capture the results in. To extend the module, you could parse the results into a task that creates a ticket in your ITSM solution or mail the results to a person. You can also find the results in the ISeC console. It will show the name that you can set in the Patch Scan – Start task settings (default set to Ivanti Automation) with the results.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;img alt="view module parameter" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/08/automation8.png"&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Deployment of Patches&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;After a scan, you probably want to deploy the missing patches. This works the same way as the Patch Scan tasks. The deploy task is broken into several smaller tasks (start, wait, report). The ‘Ivanti Security Controls – Patch Deploy’-Download task can pre-download the patches in the cache of the server, distribution server and clients. The Deploy-Start task starts the deployment. As input it needs the PatchScanID that you also used in the earlier tasks. Other required task settings are the Deployment Template Name and the Credentials Name. This will result in a PatchDeployID that can be used for the -Wait command to wait till the task is finished (keep in mind that when missing a lot of patches, you might have to set a higher Deploy time-out for this task). The -Results task will show a summary of the deployment while the Report function results in a detailed report as output.&lt;/p&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="cms_type" value="video"&gt;&lt;param name="platform" value="vimeo"&gt;&lt;param name="id" value="353457206"&gt;&lt;/object&gt;&lt;/p&gt;

&lt;p&gt;When combining Ivanti Security Controls with Ivanti Identity Director, it is possible for non-administratorsand users without access to the ISeC console to scan their systems upon request. They can scan, deploy and reboot the system when they are ready. See the video above&amp;nbsp;for an example how this can work.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/library?eol=rl" target="_blank"&gt;&lt;img alt="Free Whitepaper: What to do BEFORE all hell breaks loose" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/07/hell.breaks.loose.1.png"&gt;&lt;/a&gt;&lt;/p&gt;
</description><pubDate>Mon, 12 Aug 2019 21:54:41 Z</pubDate></item></channel></rss>