Connect with us

Hi, what are you looking for?

Tech & Science

Transforming cybersecurity: Advanced governance and best practices in action

Krishnamurthy Oku’s role in leading cybersecurity initiatives at AT&T aligns closely with current industry trends

Photo courtesy of Krishnamurthy Oku
Photo courtesy of Krishnamurthy Oku

Opinions expressed by Digital Journal contributors are their own.

In cybersecurity, AT&T has been at the top when it comes to innovations, transforming how organizations protect their digital assets. One of the most significant projects in this industry is the integration of advanced cybersecurity measures into AT&T’s network infrastructure. This initiative has enhanced the security posture of the company and set a new standard for the industry. Behind this transformative effort is Krishnamurthy Oku, an IT professional with over two decades of experience in data protection, cloud technologies, and cybersecurity.

Oku’s role in leading cybersecurity initiatives at AT&T aligns closely with current industry trends. His expertise includes promoting the Zero Trust security model, which emphasizes continuous verification and monitoring of data access. In cloud security, Oku plays a key role in managing and optimizing Azure environments, including creating Migration Assessment Templates for transitioning systems to Azure Virtual Machines (VMs) and performing regular security audits to identify and address potential risks. His skills in identity and access management, such as Multi-Factor Authentication (MFA) and conditional access policies, bolster robust security measures.

Additionally, Oku’s work on developing CI/CD pipelines with Azure DevOps and optimizing cloud resources for cost efficiency demonstrates a proactive approach to modern cybersecurity challenges. His focus on disaster recovery planning using geo-redundant storage and Azure Site Recovery highlights his commitment to ensuring organizational resilience and high standards in data protection and operational efficiency.

Implementing identity and access management controls

Identity and access management (IAM) is part of Oku’s cybersecurity strategy. He implements IAM controls, such as MFA and Privileged Identity Management (PIM), to safeguard Azure resources and make sure that only authorized users access sensitive data.

Oku uses his knowledge of IAM to secure AT&T’s Azure Active Directory resources. His implementation of MFA adds an additional layer of security, requiring users to verify their identities through multiple methods before gaining access. Additionally, his use of PIM helps manage access permissions. To set up the PIM baseline for AT&T, the company uses a subscription management tool (SMT) to accelerate configurations. Through SMT, DevOps request functions are efficiently managed. 

Oku achieved a significant milestone by creating a new Azure DevOps (ADO) project using the SMT tool. He migrated manually created DevOps functionalities to SMT, allowing for streamlined management of subscriptions and ADO resources. This includes tasks such as managing/repairing the Log Analytics Workspace (LAW), updating the ADO agent VMSS cloud-init, updating the ADO agent pool image (both Windows and Linux to different OS versions), and creating and configuring Azure Container Registry, Shared Image Gallery, and Storage Account in production.

Applications onboarded to ADO using SMT initially utilized the AT&T Golden Image, with all necessary packages for pipeline execution installed via cloud-init during the boot process. This process, which took 30 to 40 minutes, rendered the Elastic pool standby configuration inefficient. Application teams were unable to set this configuration to zero to save costs due to the long time it took for the ADO agent to come online.

As part of the SMT enhancements, Oku developed an ADO Golden Image on top of the AT&T Golden Image with all necessary packages pre-installed. This innovation reduced the agent boot-up time from 30 minutes to less than 5 minutes. Under Oku’s leadership, AT&T reduced security incident response times by 30% and improved compliance audit scores by 25%, surpassing industry standards.

A proactive approach to vulnerability management

Oku’s approach includes several key strategies to ensure that AT&T’s operations remain compliant, including regular security audits, continuous monitoring, and leveraging Azure’s compliance certifications. His commitment to enhancing security practices is evident in the structured approach his team has adopted for managing vulnerabilities.

First, critical and high vulnerabilities are addressed within 30 days, aligning with industry standard Service Level Agreements (SLAs). This prioritization focuses on PCI and internet-facing assets. Second, exceptions are restricted to situations where compensating controls can effectively reduce risk.

Third, the frequency of patching has been increased to ensure timely updates and minimize exposure windows. Fourth, Oku’s team has enhanced secure software development practices to prevent vulnerabilities from being introduced during the development phase. Fifth, unapproved and unused software has been removed from systems to reduce potential attack surfaces.

Sixth, vulnerability scan coverage, frequency, and the use of authenticated scans have been increased to provide a more comprehensive view of the security posture. Finally, the reporting process for vulnerabilities has been improved to ensure that all stakeholders are informed promptly and effectively.

By employing these key strategies to manage vulnerabilities, Oku’s team significantly reduced the mean time to remediation for critical severity vulnerabilities from 90 days to merely 30 days, resulting in an increase in SLA compliance from 65% to 95%. They also implemented a structured approach for managing vulnerabilities through the Policy Exception Request (PER) Process, achieving a 100% success rate in managing vulnerabilities associated with PERs.

Under Oku’s leadership, the vulnerability reporting process has been enhanced, resulting in a 40% reduction in response time to identified threats. This proactive approach has led to faster resolutions and a more resilient defense against potential security incidents. 

Oku’s efforts to align AT&T’s use of Azure with various regulatory requirements, such as General Data Protection Regulation (GDPR), Health Insurance Portability and Accountability Act (HIPAA), and Payment Card Industry Data Security Standard (PCI DSS), has helped the organization to manage potential penalties and maintain the trust of its customers. Following AT&T’s footsteps, several Fortune 500 companies have adopted similar strategies to manage penalties, maintain customer trust, and adopt similar security frameworks. As industries increasingly adopt these strategies, Oku’s work has influenced further innovations in cybersecurity, driving advancements in automated threat detection, cloud security management, and compliance practices.

Enhancing cybersecurity governance and compliance

Beyond AT&T, Oku’s implementation of advanced cybersecurity governance and IAM controls has offered AT&T valuable strategies that have been applied to industries such as finance, healthcare, and telecommunications. 

In the finance industry, major institutions like JPMorgan Chase have significantly enhanced their cybersecurity posture by adopting Oku’s approach to compliance and vulnerability management. Financial organizations are able to effectively protect sensitive data and ensure compliance with industry regulations such as PCI DSS by implementing regular security audits, prioritizing rapid remediation of critical vulnerabilities within a 30-day timeframe, and maintaining a structured patching cycle. 

JPMorgan Chase, known for its strong focus on cybersecurity, has already seen substantial benefits from similar solutions. For instance, by utilizing advanced fraud detection technologies, the bank achieved a remarkable 40% reduction in fraudulent transactions. Additionally, JPMorgan Chase successfully cut down reporting time by an impressive 50% by adopting automated compliance reporting tools akin to those used by Oku’s team. Furthermore, implementing strong IAM controls, as demonstrated in Oku’s strategy, ensures that only authorized personnel have access to critical financial systems, further strengthening the overall security posture of the organization.

In the healthcare industry, Oku’s cybersecurity strategies align closely with the sector’s unique needs, particularly in meeting stringent regulations like HIPAA. For instance, Mayo Clinic, a hospital network known for its commitment to cybersecurity, has adopted similar approaches to protect patient information and maintain the integrity of its medical systems. Healthcare organizations like Mayo Clinic have significantly enhanced their protection of sensitive patient data and reduced overall security risks by conducting regular vulnerability scans, adopting secure software development practices, and managing medical device risks. 

The impact of such measures is evident in Mayo Clinic’s success story: after implementing a system akin to Oku’s to manage patient data more effectively, the hospital network witnessed a remarkable 25% improvement in patient outcomes. Furthermore, by using similar technology to optimize scheduling processes, Mayo Clinic achieved a 30% reduction in patient wait times, demonstrating the far-reaching benefits of robust cybersecurity practices in the healthcare sector.

Meanwhile, in the telecommunications industry, Verizon, a leading provider known for its robust approach to managing vulnerabilities and securing its infrastructure, has significantly benefited from adopting Oku’s methods. Telecom companies like Verizon can effectively prevent service disruptions and safeguard sensitive customer data by implementing Oku’s strategies for swift vulnerability management and threat response. Oku’s emphasis on global compliance and strict IAM controls plays a crucial role in securing telecom infrastructure.

Verizon has already demonstrated the value of such solutions, having employed similar technology to optimize network management, resulting in a remarkable 35% increase in network reliability. Furthermore, by leveraging comparable tools to enhance customer service operations, Verizon achieved an impressive 20% boost in customer satisfaction. These outcomes underscore the significant impact of Oku’s approach in the telecommunications sector, enabling companies to fortify their security posture, maintain operational continuity, and deliver exceptional customer experiences.

What’s next for cybersecurity?

Oku’s approach to cybersecurity governance at AT&T has set a new standard for the industry and beyond, demonstrating the effectiveness of using advanced security tools, automation, and best practices. His work has significant implications for diverse sectors, including finance, healthcare, and telecommunications, as organizations seek to strengthen their cybersecurity frameworks and maintain compliance with evolving regulations.

Oku’s deployment of the Astra portal for active monitoring and monthly OS image updates serves as a model for effective threat response strategies. Organizations across industries can enhance their ability to detect and mitigate cyber threats promptly by adopting similar approaches. Furthermore, Oku’s use of CI/CD pipelines for secure Linux image creation and streamlined DevOps functions showcases the potential for automation and efficiency in cloud resource management. This forward-thinking approach has inspired further innovations in DevOps and cloud security, as organizations seek to optimize their processes and reduce costs.

As the cybersecurity landscape continues to change, Oku’s work serves as a foundation for future advancements. His methods have paved the way for the broader adoption of integrated security platforms, AI-driven threat detection, and automated compliance management. These developments will be crucial in staying ahead of increasingly sophisticated cyber threats and ensuring the resilience of digital infrastructures.

Avatar photo
Written By

You may also like:

Tech & Science

Radiolab focuses on investigative journalism into science, tech and even legal history. Continuing with over 200 episodes.

Business

The report details the output from AI systems used to identify critical trends shaping the future of AML and financial crime prevention.

Tech & Science

The Internet Archive, an online repository of web pages, was offline Thursday after its founder confirmed a major cyberattack.

World

The Nobel Peace Prize was awarded to the Japanese anti-nuclear group Nihon Hidankyo, atomic bomb survivors from Hiroshima and Nagasaki.