The ancient Chinese military strategist Sun Tzu would agree: The best defense is to avoid an attack in the first place.

4 Min Read
Replica edition of The Art of War
Replica edition of "The Art of War"Source: HeritagePics via Alamy Stock Photo

"The greatest victory is that which requires no battle." —Sun Tzu

These millennia-old words of ancient Chinese military strategist Sun Tzu — to whom The Art of War is attributed — are still very relevant today. The best defense is to avoid an attack in the first place. With the right architecture and approach, it's possible to shield your environment from the cybersecurity arms race so that when the attacker strikes, you simply aren't there.

Practice Attack Avoidance
Attack avoidance is one of the three critical aspects of enterprise security, along with prevention, which ensures that networks and systems are hardened against attacks, and detection, which identifies anomalies and provides a means to respond to attacks. Attack avoidance is often overlooked or subsumed in the larger zero-trust conversation but addressing it in the first stage of risk management brings immense benefit.

The best way to foil an attack is to make sure the attack never happens. In Sun Tzu's time, that meant prioritizing information to gain the upper hand both strategically and tactically. In modern cyber defense, that translates into harnessing the full power of data, automation, and policy.

The simplest way to avoid an attack is to minimize the attack surface. To accomplish this, you need to:

  • Eliminate your external attack surface by migrating to cloud-delivered zero-trust access with an outbound-only access model.

  • Reduce internal attack surface by leveraging zero-trust user-to-app segmentation for private apps.

  • Minimize individual endpoint attack surface by protecting end-user Internet traffic.

  • Reduce the data attack surface with software-as-a-service (SaaS) controls such as a cloud access security broker (CASB), data loss prevention (DLP), and other solutions.

The great thing about zero trust is that every device, application, and user is distinct. Finding your way into one device doesn't get you into the rest of the environment, because nothing trusts anything else completely. If we can make those individual attack surfaces stealthy, we can up our security game even further.

You Cannot Attack What You Cannot See
Traditional VPN gateways depend on an open inbound listener that can be discovered and engaged by anyone on the internet. Connecting an endpoint to a network exposes the entire network — and the endpoints connecting to it — to potential damage from ransomware or internal threats. Removing the inbound listener eliminates the attacker's foothold and connecting users to applications protects both the network itself and the devices from which users are connecting.

The old castle-and-moat method of protection is no longer a viable security model. This model enclosed your business with walls and barriers — but once someone got in, they had free rein inside the castle. In this new model, no one knows where your estate or business is, and even when you escort visitors/employees into your estate, they only have access to the parts of your estate that you show them. The rest of your technology estate is completely hidden from view.

From development to risk assessment, reducing the attack surface with modern technology choices will help your organization better protect itself and allow you to remove parts of your estate from the arms race entirely.

As Sun Tzu also said, "For to win one hundred victories in one hundred battles is not the acme of skill. To subdue the enemy without fighting is the acme of skill."

Cybersecurity Is Good for Business
Security is often discussed in negative terms — data breaches, regulatory fines, and business disruption. However, the advantages are seldom highlighted. Here are a few to consider:

  • Retain customers and show commitment. Creating a culture that prioritizes data security and privacy shows a high level of corporate social responsibility. Companies that are careless with personal details and suffer a breach are often subjected to tremendous backlash from consumers and business partners. Conversely, taking the initiative to prevent security breaches enhances an organization's reputation.

  • Compliance leads to business opportunities. Most businesses rely on a network of partner organizations. As collaborations extend to the cloud and hybrid networks, demonstrating security compliance becomes a requirement for doing business. With the growing number of data breaches, companies are taking a hard look at the security practices of potential partners as a precondition to doing business.

  • Innovation trumps inactivity. Companies prioritize growth-driving innovation. Agile cybersecurity policies can enable companies to continue their groundbreaking work without interruption, fueling revenue and profits. However, in a study conducted by Cisco, 71% of executives said cybersecurity concerns impeded innovation at their companies. Among respondents, 39% said they had halted mission-critical initiatives because of cybersecurity issues. These responses highlight how enterprise security weaknesses can hamstring an organization's ability to innovate precisely when it's most critical.

With a simple change in perspective, business leaders can address security in terms of what it means to business opportunities, allowing for a more grounded, less fear-based discussion when it comes time to set enterprise security strategies.

About the Author(s)

Gregory R. Simpson

Former CTO of GE and Former CTO of Synchrony Financial

Greg Simpson is an experienced technologist, having been CTO at numerous GE businesses, and GE overall. As CTO of Synchrony, Greg first launched the foundational infrastructure to support its IPO and then drove a transformation built on a strategic technology stack that was built on the cloud, a new data lake, application APIs, and AI, enabling faster solution delivery for Synchrony customers. He also was instrumental in its transformation to a work-from-home culture during the pandemic, Greg was named a Premier 100 Technology Leader by Computerworld in 2016. His latest project is a techno-thriller novel that will be released early next year.

Lisa Lorenzin

Field CTO – Americas at Zscaler

Lisa Lorenzin is Field CTO – Americas at Zscaler, specializing in secure application access and digital transformation. For more than 25 years, she has worked in a variety of network and information security roles and has contributed to open standards for endpoint integrity and network security from the Trusted Computing Group (TCG) and Internet Engineering Task Force (IETF).

Lisa's current focus is on helping customers achieve their security goals and create a seamless user experience across cloud and mobile environments through the use of cloud-delivered zero trust access solutions.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights