Monday, April 22, 2013

Applications are like puppies!



As I talked about in another blog post (Hoarding: an organizational phenomenon), hoarding applications can lead to an overwhelming and oppressive IT environment for the staff and the organization.

I like analogies. Buying an application is a lot like owning a puppy to people who have never owned a puppy before.
  1. Everyone loves looking at a puppy (just like the business thinking about buying an application).
  2. Everyone loves looking at the puppy do things (or for applications, capabilities and demos).
  3. Everyone imagines having a puppy being full of Frisbee and cuddle time (or for applications, the business operating like a scene out of The Coca-Cola Happiness Factory).
  4. At this point, everyone that wants a puppy agrees that it would be great to own a puppy. I mean, look at that picture! Isn't that puppy cute? How could you not want a puppy!?
Committing to a puppy is only a short term engagement. A puppy is only a puppy for a year, maybe. The reality is that you're truly commit to the full life cycle of a canine. Not only is your puppy a puppy, it will absolutely become a dog. It is inevitable. 

Applications have a similar life cycle. Commit to a puppy of application, when it is all cute and funny, you are also committing to the dog of an application, where you need to clean up after it and take it to the vet regularly, like  pay maintenance and for upkeep, including security updates. And...eventually, the dog becomes old and you'll need to put it down, just like old applications.

See, applications are like puppies!

Chris

photo credit: Roozbeh Rokni via photopin cc

Thursday, April 18, 2013

Hoarding: the organizational phenomenon



Applications are a key part of the success of companies these days. An organization's ability to create new capabilities and deliver new products often lies in the ability to execute on delivering new services with applications. It makes sense that we have applications, and even many applications. I've been thinking lately about the cost of supporting applications and infrastructure. As a security leader, I'm frequently thinking about what it costs to protect the organization from known and unknown IT security threats. The most significant threat is probably those same applications we all implement and use in an organization to propel the business forward. 

I believe many organizations, and specifically leaders, have a bad habit of implementing things. I've inherited half-baked SIEM tool implementations 3 times now, for instance. Some organizations have processes to try to curb overall spend on IT implementations, as well as ROI calculators that help in determining if that product is a good idea for the company to implement. Regardless of these processes, and despite these processes, if leaders are not careful and intentional about product implementations, organizations become like hoarders we see on reality TV shows on A&E or TLC. (Truth be told, I've watched a number of them. Hoarders: Buried Alive, for example.) 

Hoarders love to collect. Hoarders love to buy something, "own" it and bring it home. Organizations, meaning IT and the business, purchase and collect applications that feel (and maybe are) really valuable and really meaningful to the work that they perform. They are all beautiful and valuable when they're new to an organization. Leaders get credit for implementing new technology and enabling new capabilities in the organization. There is an all too common life cycle of products however:
  1. The teams implementing the product go from "fighting for it"  (insert appropriate long pause for the typical long implementation here) to "its implemented!" 
  2. Now the organization settles into a time where the operational teams are getting to know the product and working on operationalizing it; building processes, workflow, troubleshooting, etc. (some should have happened prior to implementation, for sure, but lots will happen after)
  3. At this point, it is "installed" and probably "operational". This product will sit in a portfolio of other applications that have been implemented and collected over the years. 
  4. Various teams pay various levels of attention to the, now old, apps. So, over time,  they sit and rot. They may be maintained...or not.
Hoarders are not good at assessing the value of something in relationship to what it costs to keep and maintain it. Eventually, you have a house full of things you've bought and no where to sit or sleep. In a company, the analog of running out of space is running out of budget. No organization can afford to keep every application going that they've purchased over the years, because:
  1. You may no longer have the budget to pay for the staff with the numerous and varied skills needed to maintain a diverse and sprawling application environment. 
  2. You may not find that the vendors will support the application versions you're running, security updates included.
  3. You may find that vendors are not willing to support out of date core IT infrastructure older platforms sit on.
  4. I, as an IT security function, will point out the affects of #2 and #3 on what is in the environment on a regular basis. 

Leaders are then forced to make a decision, which is a great thing. We need to consider what doesn't need to be maintained and can be removed from the environment. Unfortunately, leaders do not get much credit for dismantling old platforms. Sometimes they get credit for reducing overhead, but there's much more value than just reducing overhead. That is a culture problem that we need to change. Leaders should be rewarded for reducing complexity, reducing risk and reducing overhead. "A penny saved is a penny earned!" said Ben Franklin.

Unfortunately, we can't just call 1-800-Got-Junk and get rid of old applications. But I'd suggest some good directions to base actions: 
  1. create threshold for purchasing applications that involves exposing the risks and fully loaded expenses for an application, and use that to slow down expense sprawl
  2. create standards for the business and IT to follow, and be diligent about growing and tending those standards to meet and be predictive about the organization's needs.
  3. make sure that the cost of maintaining systems is appropriately attributed to where in the organization that system/application supports the business.
  4. make decisions to consolidate like applications.
  5. make decisions to consolidate vendors .
  6. make decisions to simplify the infrastructure.
In the end, I think the primary information security concern about the environments we operate in can be boiled down to being intentional about what we put into the environment. Know what the risk and commitments are before you take action and implement. 

Chris

photo credit: canonsnapper via photopin cc