I don't usually recommend reading the comments on reddit, but I think we as security practitioners should read the comments on this thread and reflect on how we can do a better job of collaborating, communicating, and delivering value.

https://www.reddit.com/r/sysadmin/comments/16uqyi1/does_your_security_team_not_want_to_be/

Does your security team not want to be responsible or own ANYTHING?

Password policy? No we don’t own that. Configuration hardening standards? Nope don’t own that. Vulnerability response process? Not us....

reddit
@accidentalciso I advocate that we are the fire department of the company. I also need to mandate watching Backdraft for my younger coworkers. "You go, we go" scene is key. One team, one fight. Our team is the greater company.

@accidentalciso I've been on both sides of the comments. When I was a newish SA team lead, I had a person from security operations drop a 50+ page printed report from his newly installed vulnerability scanner on my desk. He said "this is my proof that you don't know how to do your job." Needless to say, he never got much traction with my team.

Thankfully that was lots of years ago. Now that I'm running security for my org, I try to keep that jerk in mind as an example of how not to build a relationship with the ops teams.

@accidentalciso It is eye opening how many sysadmins in that thread think security does "nothing", yet in reality security has a higher burn out rate than IT.

@accidentalciso i am huffy after reading that….

I want to be mad but honestly I see their point even if I can spend hours breaking it all down

@accidentalciso The problem is that when you make the security team responsible for the topics, the other teams will consider everything that has remotely to do with security their job. And how should that work out with 20 development teams and one security team. Sure, you can make the security team responsible for the actual doing of things, but then please scale the team to an appropriate size. I think having dedicated sec people in the dev teams and only a core sec team is way more efficient.

@accidentalciso in my opinion the problem is often not what these teams (can) do and more how they do it.

Somewhere in the thread someone mentions ‘impositions’ and that’s exactly where things go wrong. I’ve seen teams all over the range from terribly bad to extremely capable. The most successful ones were always the ones that considered themselves to be part of IT. Every team that was located in another building and only communicated via email never got anything done, while the loner responsible for 20 teams and joined standups, lunches, and sat between the IT people actually got help doing their job.

The book ‘promising digital risk management: what no to do in cybersecurity’ is really a recommendation how to handle this better. The basis is ‘promise theory’; if you tell people what to do (ie impose), they will do the least amount to get you of their backs, while if you actively participate and ask people what they want to promise, you’ll get immediate ownership and flip your role from being a cop to becoming a counselor.

But it doesn’t stop there; you also need to become part of the process and not in the way of being that red square on a PowerPoint process flow. Act as a real stakeholder because you are. You represent the hidden desires of the users (things they don’t miss until they’re missing; the KANO model described this perfectly https://www.mindmesh.com/glossary/what-is-kano-model). So integrate your processes in every other business process and make it active and interactive. Combine the BIA with product strategy sessions, embed threat modeling with architecture, make risk management a refinement activity, etc etc and automate wherever you can.

Also accept that perfection is the enemy of good. It’s better to do something with 50% efficacy every week than something with 90% once a year. The most frequently encountered example is using sonarqube as SAST. Security teams often don’t like that because “it’s not that good”. Don’t be like that; if teams want to use that, let them, but also force them to make promises on how they follow up on that.

Citibank decided 40 years ago that infosec should be a separate department with their own budget and C role. That was a bad call imho and everyone is now experiencing the fallout of that decision. We need to reverse that and start being part of the business and IT again.

What is the Kano Model – Definition, Example & FAQ | Mindmesh

The Kano model is a customer satisfaction measurement tool that prioritizes features based on customer reaction to their presence or absence, effectively determining their impact on customer satisfaction.

@accidentalciso something that strikes me as a common issue in those comments is that there is a division of duties but it hasn’t been communicated where that division is.

The security teams being complained about could make a big old RACI matrix for the activities they’re involved in and use it to write role descriptions. It would start a conversation that could explain things and maybe uncover some gaps.