<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[CCNet - Blog]]></title><description><![CDATA[Stay up to date and learn from CCNet experts on topics such as IT, new certifications, AI, digitalization and much more.]]></description><link>https://www.ccnet.de/en/blog/</link><image><url>https://www.ccnet.de/en/blog/favicon.png</url><title>CCNet - Blog</title><link>https://www.ccnet.de/en/blog/</link></image><generator>Ghost 5.72</generator><lastBuildDate>Wed, 29 Apr 2026 09:58:17 GMT</lastBuildDate><atom:link href="https://www.ccnet.de/en/blog/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[Social Engineering: Voice, Image, Context]]></title><description><![CDATA[Stop social engineering with processes, MFA & realistic exercises to protect money, data & nerves.]]></description><link>https://www.ccnet.de/en/blog/social-engineering-voice-image-context/</link><guid isPermaLink="false">69a56eab1fa63d476bec2318</guid><category><![CDATA[Cybersecurity]]></category><dc:creator><![CDATA[CCNet]]></dc:creator><pubDate>Fri, 06 Mar 2026 09:00:33 GMT</pubDate><media:content url="https://www.ccnet.de/en/blog/content/images/2026/03/EN-2.png" medium="image"/><content:encoded><![CDATA[<h2 id="what-has-changed">What Has Changed</h2>
<img src="https://www.ccnet.de/en/blog/content/images/2026/03/EN-2.png" alt="Social Engineering: Voice, Image, Context"><p>In the past, a blunt <strong>phishing</strong> link was enough. Today, attacks come in a business-like guise &#x2013; including correctly spelled names, real signatures, and precise timing. AI generates voices, faces, and meeting invitations; <strong>deepfakes</strong> imitate managers, suppliers, or authorities. At the same time, adversary-in-the-middle (<strong>AitM</strong>) attacks bypass classic MFA flows by capturing sessions live. This is not science fiction; it&#x2019;s everyday reality. The weak point is rarely the technology &#x2013; it&#x2019;s rushed approvals, missing call-backs, and a &#x201C;you&#x2019;ll manage it&#x201D; mindset.</p>
<h2 id="tactics-that-work-today">Tactics That Work Today</h2>
<ul>
<li><strong>Voice imitation + time pressure:</strong> A &#x201C;boss call&#x201D; shortly before the end of the day, paired with &#x201C;approve urgently.&#x201D; The content is trivial, but the context is perfect.</li>
<li><strong>Calendar injection:</strong> Real meeting invitation with a disguised link; participant list looks legitimate.</li>
<li><strong>AitM against MFA:</strong> Login via fake portals, tokens are stolen, sessions hijacked &#x2013; despite &#x201C;MFA in place.&#x201D;</li>
<li><strong>Supplier spoofing:</strong> Change of bank account &#x201C;due to a merger.&#x201D; Supporting documents look real, attachments are neatly formatted.</li>
<li><strong>Post-compromise phishing:</strong> After initial access, attackers send real emails from real mailboxes &#x2013; any &#x201C;checks&#x201D; appear positive.</li>
</ul>
<h2 id="where-companies-fail-honestly">Where Companies Fail (Honestly)</h2>
<p>Two weaknesses are constant: missing process anchors and unclear responsibilities. Many policies are PDF decoration, not lived behavior. There are no mandatory out-of-band checks, no four-eyes principle for financial transactions, and helpdesk or departments are not obliged to report &#x201C;strange calls&#x201D; immediately. In addition, legacy flows are left open (Basic/IMAP), making <strong>MFA</strong> ineffective in reality.</p>
<h2 id="how-to-stop-social-engineering-%E2%80%93-in-practice">How to Stop Social Engineering &#x2013; In Practice</h2>
<p>Focus on behavior first, then technology. The order is intentional.</p>
<ol>
<li><strong>Process over personality cult.</strong> No payment, account change, or privilege escalation without documented counter-check via a second, known channel. No exception bonus for &#x201C;important&#x201D; people &#x2013; they are the ones imitated.</li>
<li><strong>Mandatory out-of-band rituals.</strong> Predefined callback numbers (from internal directory), code words for sensitive approvals, callback only via centrally stored contacts &#x2013; not the number from the email.</li>
<li><strong>Phishing-resistant login.</strong> <strong>MFA</strong> with passkeys/FIDO2, disable weak protocols, session re-challenge on risk. Against <strong>AitM</strong>, technology <em>plus</em> context checks help (e.g., domain binding, device binding).</li>
<li><strong>Take least privilege seriously.</strong> The fewer permanent rights, the smaller the impact of coerced approvals. Time-based admin rights (JIT) reduce pressure situations.</li>
<li><strong>Realistic exercises.</strong> No slides. Simulate boss calls, supplier changes, calendar invites &#x2013; including time pressure and &#x201C;please do quickly.&#x201D; Goal: make the stop-signal (&#x201C;call back!&#x201D;) reflexive.</li>
</ol>
<h2 id="processes-for-money-identity-changes-minimal-standard">Processes for Money &amp; Identity Changes (Minimal Standard)</h2>
<ul>
<li><strong>Four-eyes principle</strong> for all payments over threshold X and for any bank data changes.</li>
<li><strong>Two-channel verification:</strong> Callback via internally maintained number <em>plus</em> written confirmation using a stored template.</li>
<li><strong>Blocking period:</strong> New bank data activated only after documented verification chain.</li>
<li><strong>Supplier whitelist:</strong> Changes only if the requesting person and channel match a stored record.</li>
<li><strong>Audit trail:</strong> Every approval generates a ticket with timestamp, verification steps, and participants. No ticket &#x2013; no change.</li>
</ul>
<h2 id="technology-that-really-helps-without-vendor-names">Technology That Really Helps (Without Vendor Names)</h2>
<ul>
<li><strong>Email authentication &amp; anomaly detection</strong> (SPF/DKIM/DMARC + heuristic checks) reduce noise &#x2013; but never replace the process.</li>
<li><strong>Link/attachment policies</strong> with pre-execution checks, sandboxing for unknown files, and blocking known abuse flows.</li>
<li><strong>Browser isolation</strong> for high-risk targets (Finance, HR) when opening external links from emails or calendars.</li>
<li><strong>Session security:</strong> Token binding to device/browser, short validity, automatic logout on context change.</li>
<li><strong>Identity telemetry:</strong> Impossible travel, role deviations, unusual approvals &#x2192; immediate query/step-up auth.</li>
</ul>
<h2 id="metrics-that-matter-and-apply-pressure">Metrics That Matter (And Apply Pressure)</h2>
<ul>
<li><strong>Verification rate</strong> for money/identity changes: proportion of cases with successful two-channel checks.</li>
<li><strong>Time-to-verify:</strong> Time from request to completed counter-check &#x2013; goal is fast <em>and</em> strict.</li>
<li><strong>Reporting rate:</strong> Proportion of employees reporting suspicious contacts/calls.</li>
<li><strong>AitM block rate:</strong> Blocked/aborted attempts thanks to domain/device binding.</li>
<li><strong>Push-fatigue events:</strong> Thwarted MFA spam attempts and number of disabled &#x201C;click-to-approve&#x201D; flows.</li>
<li><strong>Exercise success:</strong> Rate of passed real-scenario simulations (boss call, supplier change) &#x2013; without warning.</li>
</ul>
<h2 id="common-objections-%E2%80%93-answered-calmly">Common Objections &#x2013; Answered Calmly</h2>
<ul>
<li><em>&#x201C;It slows down our business.&#x201D;</em> &#x2013; Correct. It only slows down what moves money or changes identities. Everything else continues.</li>
<li><em>&#x201C;Our people would notice this.&#x201D;</em> &#x2013; Until stress, vacation, or shift changes occur. Processes protect people &#x2013; not the other way around.</li>
<li><em>&#x201C;We have <strong>MFA</strong>.&#x201D;</em> &#x2013; If <strong>AitM</strong> captures sessions or legacy flows are open, that&#x2019;s cosmetic. Harden or disable.</li>
</ul>
<h2 id="conclusion">Conclusion</h2>
<p><strong>Social engineering</strong> is precise, polite, and credible. Relying on gut feeling loses. Enforcing processes, hardening <strong>MFA</strong> against <strong>AitM</strong>, and practicing realistic scenarios drastically reduces hit rates &#x2013; measurable in verification and exercise metrics. This is not optional; it&#x2019;s damage control in euros and hours. In short: train a counter-voice, mandate callback, keep rights minimal. Then &#x201C;please approve quickly&#x201D; becomes &#x201C;wait, we&#x2019;re checking this&#x201D; &#x2013; and that saves money, data, and nerves.</p>
<h2 id="faq-about-blog-post">FAQ about blog post</h2>
<div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><b><strong style="white-space: pre-wrap;">Why are deepfakes so effective in social engineering?</strong></b></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">Deepfakes are highly effective because they combine </span><b><strong style="white-space: pre-wrap;">context, voice, and time pressure</strong></b><span style="white-space: pre-wrap;"> and exploit </span><b><strong style="white-space: pre-wrap;">missing company processes</strong></b></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><b><strong style="white-space: pre-wrap;">Which processes prevent financial fraud in companies?</strong></b></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">Companies prevent fraud with </span><b><strong style="white-space: pre-wrap;">two-channel verification</strong></b><span style="white-space: pre-wrap;"> and the </span><b><strong style="white-space: pre-wrap;">four-eyes principle</strong></b><span style="white-space: pre-wrap;"> for payments and account changes</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><b><strong style="white-space: pre-wrap;">Does MFA protect against social engineering attacks?</strong></b></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><b><strong style="white-space: pre-wrap;">MFA</strong></b><span style="white-space: pre-wrap;"> only protects if it is </span><b><strong style="white-space: pre-wrap;">phishing-resistant</strong></b><span style="white-space: pre-wrap;"> and includes </span><b><strong style="white-space: pre-wrap;">session protection</strong></b><span style="white-space: pre-wrap;">, otherwise </span><b><strong style="white-space: pre-wrap;">AitM attacks</strong></b><span style="white-space: pre-wrap;"> can succeed</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><b><strong style="white-space: pre-wrap;">How can social engineering defense be trained effectively?</strong></b></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">Using </span><b><strong style="white-space: pre-wrap;">realistic scenarios</strong></b><span style="white-space: pre-wrap;"> like boss calls or supplier changes without warning helps train reflexive counter-checks</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><b><strong style="white-space: pre-wrap;">What metrics measure the effectiveness of social engineering protection?</strong></b></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">Key metrics include </span><b><strong style="white-space: pre-wrap;">verification rate</strong></b><span style="white-space: pre-wrap;"> and </span><b><strong style="white-space: pre-wrap;">time-to-verify</strong></b><span style="white-space: pre-wrap;"> to evaluate the effectiveness of security processes</span></p></div>
        </div>]]></content:encoded></item><item><title><![CDATA[The “One” Vendor Can Bring You to a Halt]]></title><description><![CDATA[Prevent vendor lock-in, practice rollbacks, and keep IT systems resilient against global update failures.]]></description><link>https://www.ccnet.de/en/blog/the-one-vendor-can-bring-you-to-a-halt/</link><guid isPermaLink="false">69a560471fa63d476bec22fd</guid><category><![CDATA[Cybersecurity]]></category><dc:creator><![CDATA[CCNet]]></dc:creator><pubDate>Wed, 04 Mar 2026 09:00:52 GMT</pubDate><media:content url="https://www.ccnet.de/en/blog/content/images/2026/03/EN-1.png" medium="image"/><content:encoded><![CDATA[<h2 id="when-an-update-becomes-a-system-brake">When an Update Becomes a System Brake</h2>
<img src="https://www.ccnet.de/en/blog/content/images/2026/03/EN-1.png" alt="The &#x201C;One&#x201D; Vendor Can Bring You to a Halt"><p>A centrally deployed agent or platform update fails &#x2014; and suddenly clients freeze, signatures collide, policies misfire, or services won&#x2019;t start. The pattern is always the same: one global switch, one rollout channel, one assumption (&#x201C;it&#x2019;ll be fine&#x201D;) &#x2014; and all at once an entire endpoint fleet stalls, authentications lag, or monitoring chains break.</p>
<p>Attackers didn&#x2019;t need access; the outage is <strong>self-inflicted through tight coupling</strong>. If you focus only on assigning blame, you miss the lesson: the problem is structural &#x2014; <strong>lock-in</strong> without an escape path.</p>
<h2 id="why-the-risk-is-underestimated">Why the Risk Is Underestimated</h2>
<p>In many security environments, controls, telemetry, and operations are <strong>topologically coupled</strong>: one console, one agent, one data format, one maintenance window. This reduces effort &#x2014; until that very advantage becomes a single point of failure.</p>
<p>Audits often find consistency reassuring: standardized reports, a single set of policies. But consistency does not equal <strong>resilience</strong>. It hides dependencies until a rollout goes wrong and the &#x201C;advantage&#x201D; turns overnight into an avalanche of costs (downtime, field support, crisis communications, ticket floods).</p>
<h2 id="minimizing-dependency-%E2%80%94-without-tool-sprawl">Minimizing Dependency &#x2014; Without Tool Sprawl</h2>
<p>This is not about ideology (&#x201C;platform vs. best-of-breed&#x201D;), but about deliberate decoupling where a failure would hurt most. Four principles are enough to turn cluster risk into manageable risk:</p>
<ul>
<li><strong>Staged rollouts instead of big bang.</strong> Start with a small, representative canary group using real production profiles, then move to rings. Rollback must be <strong>technically</strong> possible (mirrored policy states, signed artifact versions, documented downgrade paths).</li>
<li><strong>Secure out-of-band access.</strong> If the primary agent fails, you need a second channel: remote KVM, a management network, a local <strong>emergency plan</strong> for unlocking/disabling &#x2014; with an approval matrix and logging.</li>
<li><strong>Enforce data portability.</strong> Alerts, policies, and artifacts must be exportable (open formats, APIs). Without this, any &#x201C;alternative&#x201D; is just a PowerPoint fantasy.</li>
<li><strong>Targeted secondary safeguards.</strong> No tool zoo &#x2014; but for business-critical paths, a lightweight, independent layer of protection (e.g., additional sign-in hardening for identity, immutable backups, a separate logging channel). This creates <strong>interoperability</strong> without chaos.</li>
</ul>
<h2 id="exit-mechanics-that-work-today">Exit Mechanics That Work Today</h2>
<p>An <strong>exit plan</strong> is only as good as its test run. Concretely, this means:</p>
<ol>
<li><strong>Predefine functional fallbacks.</strong> For endpoint isolation, account lockout, or session termination, there is a tool-agnostic playbook and at least one second, tested execution path.</li>
<li><strong>Move artifacts in days, not months.</strong> Policies and use cases can be exported, mapped, and activated on an alternative; the most critical 10% are pre-converted.</li>
<li><strong>Consider license neutrality.</strong> Arrange emergency contingents or short-term activatable licenses with partners &#x2014; contractually binding, not &#x201C;should work.&#x201D;</li>
<li><strong>Cross-training.</strong> A second team can operate the alternative in practice. Dependence on the &#x201C;one&#x201D; admin is the quiet form of <strong>lock-in</strong>.</li>
</ol>
<h2 id="measuring-healthy-coupling">Measuring Healthy Coupling</h2>
<p>Metrics make the illusion visible. Relevant indicators include:</p>
<ul>
<li><strong>Time-to-Disable:</strong> Minutes required to deactivate or withdraw a faulty update across the environment.</li>
<li><strong>Rollback Rate:</strong> Percentage of systems that return to the last stable version without hands-on intervention.</li>
<li><strong>Canary Coverage:</strong> Percentage of realistic test nodes (different roles/locations/images).</li>
<li><strong>Out-of-Band Reachability:</strong> Percentage of critical systems with a functioning secondary channel.</li>
<li><strong>Data Portability Score:</strong> Exportability of incidents/policies/artifacts (format, completeness, re-import tested).</li>
<li><strong>Drill Success:</strong> Proven dry run of &#x201C;primary product outage&#x201D; with time to visibility/containment.</li>
</ul>
<p>These metrics belong in the same steering discussions as patch SLOs or MTTD/MTTR. Without them, <strong>IT security</strong> remains a matter of intuition.</p>
<h2 id="typical-counterarguments-%E2%80%94-and-the-sober-response">Typical Counterarguments &#x2014; and the Sober Response</h2>
<ul>
<li><em>&#x201C;An outage like that rarely happens.&#x201D;</em> &#x2014; Exactly. And that&#x2019;s why it catches you unprepared. <strong>Resilience</strong> means surviving rare events, not rationalizing them.</li>
<li><em>&#x201C;We save massive operating costs with a mono-vendor strategy.&#x201D;</em> &#x2014; True, until Day X arrives. The question is whether the hour saved today justifies a full day of downtime tomorrow.</li>
<li><em>&#x201C;We have backups.&#x201D;</em> &#x2014; Backups help with data loss. With agent or policy failures, you need control &#x2014; not a restore. Two different classes of emergencies.</li>
</ul>
<h2 id="strengthening-security-in-practice-%E2%80%94-without-naming-names">Strengthening Security in Practice &#x2014; Without Naming Names</h2>
<p>You don&#x2019;t need to switch vendors to become more secure. You need to reduce <strong>coupling</strong>: deploy rollouts in rings, test rollback paths, activate secondary communication channels, regularly validate exports, and implement a lean parallel control at business-critical bottlenecks (identities, recovery, visibility). All of this reduces the impact of a failure &#x2014; no matter where it originates.</p>
<h2 id="conclusion">Conclusion</h2>
<p>A globally failed update is not an exotic event, but an inevitable consequence of centralized control. The answer is not a tool bazaar, but architectural discipline: make <strong>lock-in</strong> visible, establish escape paths, enforce <strong>interoperability</strong>, and rehearse rollbacks.</p>
<p>That&#x2019;s what keeps you operational &#x2014; even when the &#x201C;one&#x201D; vendor stumbles. And that is the difference between convenience and true <strong>resilience</strong>.</p>
<h2 id="faq-about-blog-post">FAQ about blog post</h2>
<div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><span style="white-space: pre-wrap;">How can I prevent Big-Bang IT system failures?</span></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">Use canary rings, defined rollback paths, and signed artifact versions to deploy updates safely in stages and avoid full system outages.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><span style="white-space: pre-wrap;">What is out-of-band access in IT security?</span></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">Out-of-band access is a secondary management channel used when the primary agent or main access fails, ensuring systems remain controllable.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><span style="white-space: pre-wrap;">Which IT data should be portable?</span></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">Critical data such as incidents, policies, and artifacts should be exportable in open formats, allowing operational continuity during system changes or failures.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><span style="white-space: pre-wrap;">How do I effectively test an exit plan?</span></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">Conduct a drill where the primary product is offline, measuring the time until the issue is visible and contained, to validate the effectiveness of your exit plan.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><span style="white-space: pre-wrap;">Which KPIs are suitable for measuring system resilience?</span></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">Key metrics include time-to-disable, rollback rate, and canary coverage to evaluate rollout stability and overall IT system robustness.</span></p></div>
        </div>]]></content:encoded></item><item><title><![CDATA[The Tool Zoo Is Eating Your Resilience]]></title><description><![CDATA[How too many security tools destroy interoperability, weaken resilience, raise costs – and how true consolidation works.]]></description><link>https://www.ccnet.de/en/blog/the-tool-zoo-is-eating-your-resilience/</link><guid isPermaLink="false">69a554921fa63d476bec22e9</guid><category><![CDATA[Cybersecurity]]></category><dc:creator><![CDATA[CCNet]]></dc:creator><pubDate>Mon, 02 Mar 2026 09:30:09 GMT</pubDate><media:content url="https://www.ccnet.de/en/blog/content/images/2026/03/EN.png" medium="image"/><content:encoded><![CDATA[<h2 id="the-real-problem-behind-product-proliferation">The Real Problem Behind Product Proliferation</h2>
<img src="https://www.ccnet.de/en/blog/content/images/2026/03/EN.png" alt="The Tool Zoo Is Eating Your Resilience"><p>Many security environments have grown historically: every gap got a tool, every audit recommendation a license, every new threat another dashboard. The result isn&#x2019;t a shield, but a patchwork. The consequences are measurable: longer response times, conflicting signals, blind spots. Hard truth: more products do not automatically mean more <strong>IT security</strong>. Without solid <strong>interoperability</strong>, <strong>cyber risk</strong> increases &#x2013; even with higher budgets.</p>
<h2 id="how-to-spot-the-tool-zoo-immediately">How to Spot the Tool Zoo Immediately</h2>
<ul>
<li>Alarm carousel: One event triggers five alerts in three systems &#x2013; no one knows which one is &#x201C;real.&#x201D;</li>
<li>Handover gaps: SOC reports it, IT Ops doesn&#x2019;t understand it, the business unit feels not responsible.</li>
<li>Configuration drift: Policies are maintained differently in each tool; after three months, no one knows what&#x2019;s &#x201C;valid.&#x201D;</li>
<li>Change stress: An update in product A breaks the integration with B; the workaround blinds C.</li>
<li>Reporting theater: Quarterly reports look good &#x2013; but aren&#x2019;t correlated with MTTD/MTTR or process availability.</li>
</ul>
<p>If you&#x2019;re nodding at two of these, you&#x2019;re paying for complexity &#x2013; not protection.</p>
<h2 id="the-hidden-costs-not-listed-in-any-proposal">The Hidden Costs (Not Listed in Any Proposal)</h2>
<p>The most expensive item isn&#x2019;t the license, but friction: every additional interface requires maintenance, testing, troubleshooting, and expertise. That friction eats up response time during incidents and reduces traceability &#x2013; the exact opposite of <strong>resilience</strong>. Add strategic risk: the more proprietary formats and agents you accumulate, the higher the future migration cost. In the end, you don&#x2019;t choose the best product, but the one that hurts least. Welcome to creeping <strong>lock-in</strong>.</p>
<h2 id="consolidate-without-dogma-the-four-principles">Consolidate Without Dogma: The Four Principles</h2>
<ol>
<li><strong>Use case first, not feature lists.</strong> Define your five most important defense cases (identities, email, endpoints, external apps, supply chain). A tool only counts if it clearly improves these cases.</li>
<li><strong>One data path, many consumers.</strong> Telemetry is collected and normalized once, cleanly. Analytics may vary; the source must not. Without a consistent data path, every correlation is coincidence.</li>
<li><strong>Single source of policy truth.</strong> Security rules exist in <em>one</em> place; tool-specific derivations are generated, not manually retyped. That&#x2019;s how you avoid drift &#x2013; the quietest way to lose <strong>IT security</strong>.</li>
<li><strong>Portability over perfection.</strong> No product without reliable export paths for incidents, policies, and artifacts. This lowers exit costs and disciplines vendors &#x2013; and you.</li>
</ol>
<h2 id="the-minimum-architecture-that-actually-works">The Minimum Architecture That Actually Works</h2>
<p>Consolidation doesn&#x2019;t mean &#x201C;one tool for everything,&#x201D; but &#x201C;as little as possible, as much as necessary.&#x201D; In practice: a central event pipeline, an identity gate with phishing-resistant MFA, a consistent endpoint sensor, segmented networks, a robust backup/restore path with integrity verification &#x2013; and playbooks formulated tool-agnostically. If &#x201C;isolate,&#x201D; &#x201C;kill session,&#x201D; and &#x201C;disable account&#x201D; exist only as buttons in your favorite product, you don&#x2019;t have a process &#x2013; you have dependency.</p>
<p><strong>Core questions you should answer in writing:</strong></p>
<ul>
<li>Where is our single point of truth for events &#x2013; and what happens if it fails?</li>
<li>Which controls are intentionally duplicated, and which are just accidentally redundant?</li>
<li>How would we migrate one core function to an alternative today &#x2013; in days, not months?</li>
</ul>
<h2 id="guardrails-for-meaningful-tool-consolidation">Guardrails for Meaningful Tool Consolidation</h2>
<ul>
<li><strong>Cut overlap, not capability.</strong> Two products doing the same thing &#x201C;a little&#x201D; is an alarm &#x2013; not a security gain.</li>
<li><strong>Automate first response actions</strong> (isolate, terminate session, ticket/pager) through a neutral orchestrator. That keeps sensor choice flexible.</li>
<li><strong>Define hard stop criteria:</strong> no product without documented exports, API coverage, test strategy, and canary rollouts.</li>
<li><strong>Protect the protection chain:</strong> health checks ensuring sensors send data, parsers run, alerts escalate &#x2013; including failover.</li>
</ul>
<h2 id="what-must-be-measured-otherwise-it%E2%80%99s-just-gut-feeling">What Must Be Measured (Otherwise It&#x2019;s Just Gut Feeling)</h2>
<ul>
<li>Time to first effective containment &#x2013; not just <strong>MTTR</strong>.</li>
<li>Patch SLO compliance: internet-exposed critical issues in days, internal ones in defined weeks &#x2013; verifiable.</li>
<li>Share of correlated alerts vs. noise per use case.</li>
<li>Drift rate: how often policies diverge across tools &#x2013; and how long that goes unnoticed.</li>
<li>Exit capability: time and steps required to move a core function (e.g., endpoint detection) to an alternative &#x2013; including data migration.</li>
</ul>
<p>These metrics show whether <strong>interoperability</strong> is lived practice or just PowerPoint.</p>
<h2 id="common-counterarguments-%E2%80%93-and-the-sober-response">Common Counterarguments &#x2013; and the Sober Response</h2>
<ul>
<li><em>&#x201C;Best-of-breed beats platform.&#x201D;</em> &#x2013; Only if you can afford and master the integration pain. Otherwise, best-of-breed becomes best-of-chaos.</li>
<li><em>&#x201C;Our people like tool X.&#x201D;</em> &#x2013; Acceptance matters, but it&#x2019;s not a security criterion. If X weakens the chain, X has to go &#x2013; period.</li>
<li><em>&#x201C;We&#x2019;ll keep everything; that&#x2019;s redundancy.&#x201D;</em> &#x2013; Redundancy without clear roles is just doubled complexity. Redundancy belongs at <em>critical</em> points &#x2013; deliberately, tested, documented.</li>
</ul>
<h2 id="conclusion-fewer-tools-more-impact">Conclusion: Fewer Tools, More Impact</h2>
<p>The fastest path to robust <strong>resilience</strong> isn&#x2019;t the next purchase, but removing ballast. Real <strong>tool consolidation</strong> creates focus, reduces friction, and makes response measurably faster. It reduces <strong>cyber risk</strong> because fewer error sources, less drift, and clearer accountability remain. Consolidate with a plan, not ideology &#x2013; and keep the exit door open. Then you&#x2019;ll decide from strength, not habit.</p>
<h2 id="faq-about-blog-post">FAQ about blog post</h2>
<div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><b><strong style="white-space: pre-wrap;">How can you identify tool sprawl in your IT security environment?</strong></b></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">Common signs of tool sprawl include duplicate alerts across multiple systems, inconsistent analysis results, unclear ownership, and configuration drift in security policies. If reports look polished but are not connected to key metrics such as MTTD, MTTR, or measurable risk reduction, this often indicates excessive tool complexity rather than effective cybersecurity.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><b><strong style="white-space: pre-wrap;">What should be consolidated first in a security tool consolidation strategy?</strong></b></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">Start by identifying overlapping functionality within each security use case. The goal is to preserve critical capabilities while eliminating duplicate or partially redundant tools. Two products that perform similar tasks typically increase operational complexity and costs without improving overall security posture.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><b><strong style="white-space: pre-wrap;">Why is a unified data pipeline critical in a security architecture?</strong></b></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">A centralized and normalized data pipeline ensures that telemetry is collected once and processed consistently. Without a unified data path, alert correlation becomes unreliable and incident detection slows down. A standardized data flow improves visibility, traceability, and incident response efficiency.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><b><strong style="white-space: pre-wrap;">How can organizations maintain vendor flexibility while consolidating security tools?</strong></b></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">Vendor independence can be preserved by automating first-response actions such as isolation, session termination, and ticketing through a neutral orchestration layer. This approach keeps sensors interchangeable and prevents dependency on proprietary ecosystems or vendor lock-in.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><b><strong style="white-space: pre-wrap;">What are the most important metrics for security tool consolidation?</strong></b></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">The key metric is time to first effective containment (Time to Contain), not just overall MTTR. Additionally, organizations should measure configuration drift rates &#x2014; how often security policies diverge across tools and how long discrepancies remain undetected. These metrics indicate whether interoperability is truly operational or merely conceptual.</span></p></div>
        </div>]]></content:encoded></item><item><title><![CDATA[Mono-Vendor vs. Multi-Vendor: Weighing Risk Instead of Acting Dogmatically]]></title><description><![CDATA[<h2 id="what-it%E2%80%99s-really-about">What It&#x2019;s Really About</h2>
<p>The debate of &#x201C;one vendor versus many&#x201D; is often ideological. Does a <strong>mono-vendor</strong> stack provide clarity and speed? Yes. Does it create dependency? Also yes. Does <strong>multi-vendor</strong> deliver greater <strong>interoperability</strong> and resilience? Potentially. But does it also require stricter architectural discipline and</p>]]></description><link>https://www.ccnet.de/en/blog/mono-vendor-vs-multi-vendor-weighing-risk-instead-of-acting-dogmatically/</link><guid isPermaLink="false">699c69f21fa63d476bec22b9</guid><category><![CDATA[Cybersecurity]]></category><dc:creator><![CDATA[CCNet]]></dc:creator><pubDate>Fri, 27 Feb 2026 09:00:22 GMT</pubDate><media:content url="https://www.ccnet.de/en/blog/content/images/2026/02/EN-9.png" medium="image"/><content:encoded><![CDATA[<h2 id="what-it%E2%80%99s-really-about">What It&#x2019;s Really About</h2>
<img src="https://www.ccnet.de/en/blog/content/images/2026/02/EN-9.png" alt="Mono-Vendor vs. Multi-Vendor: Weighing Risk Instead of Acting Dogmatically"><p>The debate of &#x201C;one vendor versus many&#x201D; is often ideological. Does a <strong>mono-vendor</strong> stack provide clarity and speed? Yes. Does it create dependency? Also yes. Does <strong>multi-vendor</strong> deliver greater <strong>interoperability</strong> and resilience? Potentially. But does it also require stricter architectural discipline and more operational effort? Definitely. The truth lies in weighing trade-offs: how much concentration risk can your business tolerate &#x2013; and what integration cost are you willing to pay?</p>
<h2 id="the-appeal-of-the-mono-vendor-approach">The Appeal of the <strong>Mono-Vendor</strong> Approach</h2>
<p>A consistent ecosystem accelerates decision-making. One console, one data model, one support process. Fewer interface errors, fewer &#x201C;who is responsible?&#x201D; debates, faster onboarding for teams. In regulated environments, this also supports audits: clear accountability, consistent policies, unified reporting. Financially, bundle discounts are common &#x2013; but the real gains come from reduced friction.</p>
<p>In short: <strong>tool consolidation</strong> can create real efficiency &#x2013; as long as you actively manage the dependency you are buying.</p>
<h2 id="the-downside-lock-in-and-concentration-risk">The Downside: <strong>Lock-in</strong> and Concentration Risk</h2>
<p>One stack, one failure &#x2013; and you have a problem. A faulty update from a major security vendor can impact millions of endpoints within minutes. Without fallback bridges in place (alternative EDR, local emergency login, out-of-band management), operations may halt. Strategically, <strong>lock-in</strong> is equally dangerous: the vendor&#x2019;s roadmap becomes yours. Pricing, feature priorities, end-of-life decisions &#x2013; you carry the consequences. &#x201C;We&#x2019;ll just migrate quickly&#x201D; is wishful thinking when data formats are proprietary and playbooks, agents, and training are cemented to a single vendor.</p>
<h2 id="the-real-cost-of-multi-vendor">The Real Cost of <strong>Multi-Vendor</strong></h2>
<p>More vendors mean more translation work: normalizing events, harmonizing policies, maintaining agents, hardening connectors, coordinating releases. Without a clean architecture, you create exactly what attackers exploit: detection latency, unclear ownership, conflicting alerts. <strong>Multi-vendor</strong> can increase resilience &#x2013; but only if you deliberately decide <em>where</em> redundancy makes sense (e.g., identity + email + endpoint) and <em>where</em> complexity does more harm than good.</p>
<h2 id="a-practical-decision-framework">A Practical Decision Framework</h2>
<ul>
<li><strong>Business criticality of the use case:</strong> The closer to revenue or production core, the lower your tolerance for concentration risk &#x2192; tendency toward targeted <strong>multi-vendor</strong> resilience.</li>
<li><strong>Integration maturity:</strong> Do you have a unified data model, telemetry pipelines, playbooks? Without this, <strong>multi-vendor</strong> becomes a bottleneck.</li>
<li><strong>Current exit costs:</strong> Time and effort required to shift core functions to an alternative (data, agents, policies). The higher the cost, the more dangerous the <strong>lock-in</strong>.</li>
<li><strong>Operational capacity:</strong> Who builds, maintains, and validates connectors and correlations? If resources are limited, <strong>mono-vendor</strong> may be pragmatic &#x2013; provided strong emergency bridges exist.</li>
<li><strong>Regulation and audit:</strong> Can you prove effectiveness even if three tools secure the same path? If not, less may be more.</li>
<li><strong>Supply chain requirements:</strong> If a key customer depends on specific evidence formats or response times, you must meet those standards &#x2013; regardless of your architectural preference.</li>
</ul>
<h2 id="minimum-standards-%E2%80%93-regardless-of-your-choice">Minimum Standards &#x2013; Regardless of Your Choice</h2>
<ul>
<li><strong>Telemetry mandate:</strong> A consistent data path (identities, endpoints, network, applications). Without standardized normalization, correlation is guesswork.</li>
<li><strong>Policy single source:</strong> Security rules live in one authoritative source; tool-specific implementations are derived, not manually diverging.</li>
<li><strong>Change discipline:</strong> Canary rollouts, defined rollbacks, documented approvals. No overnight &#x201C;all-in&#x201D; patching.</li>
<li><strong>Cross-tool playbooks:</strong> First-hour steps described tool-agnostically (isolate, kill session, disable account, emergency communication).</li>
<li><strong>Monitoring the monitoring chain:</strong> Watchdog checks to verify sensors and agents are reporting, correlation is functioning, and alerts truly escalate.</li>
</ul>
<h2 id="exit-plan-means-testing-today-not-hoping-tomorrow">Exit Plan Means Testing Today, Not Hoping Tomorrow</h2>
<p>An <strong>exit plan</strong> is not a PDF &#x2013; it is a practiced process. Three elements are mandatory:</p>
<ol>
<li><strong>Data portability:</strong> Defined exports of core artifacts (incidents, policies, artifact hashes, SBOMs) in open formats.</li>
<li><strong>Functional fallbacks:</strong> Concrete alternatives for the top three controls (e.g., endpoint monitoring, email protection, identity). Not &#x201C;we could,&#x201D; but &#x201C;we have configured.&#x201D;</li>
<li><strong>Chaos exercises:</strong> Quarterly scenario where the primary product is unavailable or disrupted. Measure time to visibility, containment, and recovery &#x2013; with documented evidence.</li>
</ol>
<p>If you fail here, you do not have a plan &#x2013; you have an assumption.</p>
<h2 id="when-mono-vendor-makes-sense-%E2%80%93-and-when-it-doesn%E2%80%99t">When <strong>Mono-Vendor</strong> Makes Sense &#x2013; and When It Doesn&#x2019;t</h2>
<p>Appropriate when you:</p>
<ul>
<li>have limited operational resources,</li>
<li>must establish unified governance quickly,</li>
<li>have practically prepared exit paths (agent switch, data export, emergency policies),</li>
<li>and secure critical business paths with additional lightweight independent controls (e.g., hardened identity, immutable backups, out-of-band communication).</li>
</ul>
<p>Not appropriate when you:</p>
<ul>
<li>tie core processes to a single update channel without alternatives,</li>
<li>rely on proprietary formats without export capabilities,</li>
<li>or lack emergency bridges and do not test them.</li>
</ul>
<h2 id="what-boards-want-to-see-%E2%80%93-and-should-see">What Boards Want to See &#x2013; and Should See</h2>
<ul>
<li>What is our actual concentration risk measured in minutes of downtime, not presentation slides?</li>
<li>Which tested emergency paths exist? Who decides, under which approval structure?</li>
<li>What would migration cost <em>today</em> (effort, time, risk) &#x2013; and what are we doing to reduce those costs?</li>
<li>Which metrics prove that our approach works (time-to-contain, patch SLO compliance, phishing-resistant authentication coverage, restore time with integrity validation)?</li>
</ul>
<h2 id="conclusion">Conclusion</h2>
<p>There is no silver bullet. <strong>Mono-vendor</strong> reduces friction &#x2013; and increases dependency. <strong>Multi-vendor</strong> can improve resilience &#x2013; and quickly consume capacity. What matters is making a conscious choice, measuring it, and paying the alternative cost in advance: data portability, <strong>interoperability</strong>, chaos testing, and exit mechanics. Those who do this can operate either model &#x2013; without illusions and without expensive surprises.</p>
<h2 id="faq-about-blog-post">FAQ about blog post</h2>
<div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><span style="white-space: pre-wrap;">How can vendor lock-in in a security stack be avoided?</span></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">Lock-in can be reduced through strong data portability, comprehensive API coverage, standardized interfaces, and regular chaos drills to validate exit readiness.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><span style="white-space: pre-wrap;">When is a multi-vendor strategy recommended?</span></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">A multi-vendor approach is advisable for business-critical core paths where targeted redundancy increases cyber resilience &#x2013; not as a blanket solution across all systems.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><span style="white-space: pre-wrap;">What is the biggest risk in multi-vendor architectures?</span></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">The main risk is integration latency caused by complex tool environments, which can delay detection and slow incident containment.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><span style="white-space: pre-wrap;">What is the key question decision-makers should ask?</span></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">How many minutes or hours of downtime are we realistically willing to risk in the event of a vendor failure &#x2013; and are we technically and organizationally prepared?</span></p></div>
        </div>]]></content:encoded></item><item><title><![CDATA[Cyber Insurance: No Free Pass]]></title><description><![CDATA[Why cyber insurance only protects with fulfilled obligations: align coverage, exclusions, evidence and KPIs effectively
]]></description><link>https://www.ccnet.de/en/blog/cyber-insurance-no-free-pass/</link><guid isPermaLink="false">699c400d1fa63d476bec229c</guid><category><![CDATA[Cybersecurity]]></category><dc:creator><![CDATA[CCNet]]></dc:creator><pubDate>Wed, 25 Feb 2026 09:00:03 GMT</pubDate><media:content url="https://www.ccnet.de/en/blog/content/images/2026/02/EN-8.png" medium="image"/><content:encoded><![CDATA[<h2 id="what-it%E2%80%99s-really-about">What It&#x2019;s Really About</h2>
<img src="https://www.ccnet.de/en/blog/content/images/2026/02/EN-8.png" alt="Cyber Insurance: No Free Pass"><p>The uncomfortable truth: A <strong>cyber insurance</strong> policy does not replace controls. It only pays if defined <strong>obligations</strong> are fulfilled and the loss fits within the policy wording. At the same time, underwriting questions are becoming stricter, sublimits tighter, and exclusions more precisely defined. Anyone who dismisses this as bureaucracy pays twice in the end: higher <strong>cyber costs</strong> during the incident and a policy that contributes little when it truly matters. The objective must be to align the policy and <strong>IT security</strong> so that claims are demonstrable and response times decrease.</p>
<h2 id="what-is-typically-covered-%E2%80%93-and-what-often-is-not">What Is Typically Covered &#x2013; and What Often Is Not</h2>
<p>Policies bundle several components. Sounds good, but the fine print matters. Typical modules include:</p>
<ul>
<li><strong>Forensics &amp; incident services:</strong> External analysis, containment, communication.</li>
<li><strong>Business interruption / loss of income:</strong> Compensation for <strong>downtime costs</strong> after defined waiting periods.</li>
<li><strong>Liability / data breaches:</strong> Defense costs, notifications, selected fees.</li>
<li><strong>Extortion:</strong> Negotiation/support; payment only under strict conditions and legal boundaries.</li>
</ul>
<p>Just as important are the limits. Common exclusions or strict conditions often relate to intentional misconduct, gross negligence, outdated systems without patch discipline, sanctions violations, certain fines (depending on jurisdiction), as well as losses outside defined timeframes or without prior insurer approval. In plain terms: without a verifiable <strong>risk management</strong> practice, much remains theoretical.</p>
<h2 id="what-insurers-realistically-demand-today">What Insurers Realistically Demand Today</h2>
<p>Underwriters no longer ask &#x201C;if,&#x201D; but &#x201C;how well&#x201D; controls are implemented in practice. Expectations include, among others:</p>
<ul>
<li>Phishing-resistant MFA on administrative and critical access; legacy authentication disabled.</li>
<li>A tested incident playbook with clear decision paths (24/7 reachable, usable out-of-band).</li>
<li><strong>Backups</strong> offline/immutable, documented restore tests with proof of integrity.</li>
<li>Patch management with SLOs (internet-exposed in days), documented exception processes.</li>
<li>EDR/logging on critical endpoints/servers with traceable alert handling.</li>
<li>Access principles (<strong>least privilege</strong>, JIT for admin rights), maintained inventories (systems &amp; identities).</li>
<li>Supply chain minimum standards: evidence, contact paths, ad hoc drills with critical providers.</li>
</ul>
<p>These requirements are not &#x201C;nice to have&#x201D; &#x2013; they are the ticket to reasonable terms and successful claims handling.</p>
<h2 id="the-critical-factor-proof-over-intention">The Critical Factor: Proof Over Intention</h2>
<p>Insurers settle claims based on evidence, not good intentions. Three elements must be solid:</p>
<p><strong>1) Incident timeline in minutes, not opinions.</strong><br>
Who saw what, when, decided what, and acted how? Timestamps, tickets, pager logs, forensic snapshots. Without a complete timeline, credibility drops &#x2013; and with it, the likelihood of coverage.</p>
<p><strong>2) Integrity of restoration.</strong><br>
Backups only have value if you can prove they are unchanged and functional under time pressure. Records (checksums, restore duration, approvals) belong in a central repository.</p>
<p><strong>3) Fulfilled <strong>obligations</strong></strong><br>
If the policy requires MFA, reporting deadlines, or approval processes, then &#x201C;almost&#x201D; equals &#x201C;no.&#x201D; Document that requirements existed <em>before</em> the loss and were adhered to <em>during</em> the incident.</p>
<h2 id="typical-pitfalls-%E2%80%93-and-how-to-avoid-them">Typical Pitfalls &#x2013; and How to Avoid Them</h2>
<ul>
<li><strong>Late initial notification:</strong> Many policies require early, structured reporting (even if not everything is clear yet). Solution: pre-prepared initial notification + contact list, legally reviewed.</li>
<li><strong>Unauthorized payments/decisions:</strong> Ransom payment, switching forensic providers, or PR actions without approval can jeopardize coverage. Solution: decision tree with approval check.</li>
<li><strong>&#x201C;We have MFA &#x2013; except&#x2026;&#x201D;:</strong> Exceptions for privileged accounts or remote access are entry points <em>and</em> grounds for denial. Solution: enforce phishing-resistant methods consistently, time-limit and compensate exceptions.</li>
<li><strong>Backups without drills:</strong> No timestamp, no checksums, no proof of integrity. Solution: quarterly restore exercise with documented timings.</li>
<li><strong>Supply chain without evidence:</strong> &#x201C;Our provider is secure&#x201D; does not count. Solution: evidence, drill protocols, 24/7 contact &#x2013; all documented.</li>
</ul>
<h2 id="how-to-pragmatically-align-policy-and-operations">How to Pragmatically Align Policy and Operations</h2>
<p>Treat the policy as part of your operational documentation. Three building blocks are sufficient for tangible impact:</p>
<p><strong>A) Policy map in the runbook</strong><br>
For each scenario (ransomware, email compromise, web app exploit), half a page: reporting deadline, contact channel, approval rules, limits/sublimits, do&#x2019;s &amp; don&#x2019;ts. This page belongs in the incident folder &#x2013; not only on the intranet.</p>
<p><strong>B) Pre-structured evidence collection</strong><br>
Standard folders with placeholders: &#x201C;Initial notification,&#x201D; &#x201C;Containment log,&#x201D; &#x201C;Forensic snapshots,&#x201D; &#x201C;Insurer approvals,&#x201D; &#x201C;Communication.&#x201D; When the incident unfolds, teams fill them in real time. Goal: no detective work afterward.</p>
<p><strong>C) Quarterly alignment with underwriting</strong><br>
Do not debate during a claim whether you are &#x201C;good enough.&#x201D; A brief, documented review (MFA coverage, patch SLO, restore times, supply chain evidence) creates clarity &#x2013; and better terms.</p>
<h2 id="what-you-should-measure-and-why-it-matters">What You Should Measure (and Why It Matters)</h2>
<p>KPIs are not an end in themselves; they influence premium, retention, and negotiation power:</p>
<ul>
<li><strong>MFA coverage (phishing-resistant)</strong> for privileged and externally exposed access.</li>
<li><strong>Patch SLO compliance</strong> separated by internet-exposed/internal (including documented exceptions).</li>
<li><strong>Time-to-contain</strong> and <strong>MTTR</strong> by criticality &#x2013; verifiable through tickets and pager logs.</li>
<li><strong>Restore time &amp; integrity</strong> of the two most critical processes, tested at least annually.</li>
<li><strong>Supply chain fitness:</strong> Share of critical partners with current evidence/successful drills.</li>
<li><strong>Initial reporting time</strong> to insurer/authorities according to policy terms &#x2013; no gut estimates.</li>
</ul>
<p>The more robust these figures, the easier it is to negotiate sublimits, exclusions, and premiums &#x2013; and the more likely smooth claims handling becomes.</p>
<h2 id="conclusion-protection-is-built-before-the-loss">Conclusion: Protection Is Built Before the Loss</h2>
<p>A <strong>cyber insurance</strong> policy is sensible &#x2013; as <em>part</em> of <strong>risk management</strong>, not as a substitute. It works when controls are practiced, <strong>obligations</strong> are understood, and evidence is ready. Those who align policy, processes, and technology reduce <strong>cyber costs</strong> before the first reimbursement dollar: faster decisions, shorter outages, fewer disputes in claims handling. Anything else is expensive cosmetics &#x2013; and cosmetics are unreliable in a real incident.</p>
<h2 id="faq-about-blog-post">FAQ about blog post</h2>
<div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><span style="white-space: pre-wrap;">Does cyber insurance cover all damages?</span></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">No. Every policy contains clear exclusions and binding obligations that must be strictly fulfilled.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><span style="white-space: pre-wrap;">What do underwriters expect from companies?</span></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">Insurers typically require MFA on critical access, defined patch SLOs, documented restore protocols, and tested incident runbooks.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><span style="white-space: pre-wrap;">When should a cyber incident be reported to the insurer?</span></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">An incident must be reported early, in a structured manner, and strictly in line with policy requirements to avoid jeopardizing coverage.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><span style="white-space: pre-wrap;">Is ransom payment allowed under cyber insurance?</span></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">Ransom payments are only possible under strict, legally reviewed conditions and usually require formal approval processes.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><span style="white-space: pre-wrap;">What measures can reduce insurance premiums?</span></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">Documented technical and organizational controls, along with a complete incident timeline, strengthen negotiation power and can help lower premiums.</span></p></div>
        </div>]]></content:encoded></item><item><title><![CDATA[NIS2: Who is affected? Directly, indirectly – and through the supply chain]]></title><description><![CDATA[NIS-2 affects more companies than expected: direct, indirect and via the supply chain. Practical guide with KPIs.
]]></description><link>https://www.ccnet.de/en/blog/nis2-who-is-affected-directly-indirectly-and-through-the-supply-chain/</link><guid isPermaLink="false">699c09261fa63d476bec218f</guid><category><![CDATA[Cybersecurity]]></category><dc:creator><![CDATA[CCNet]]></dc:creator><pubDate>Mon, 23 Feb 2026 09:00:50 GMT</pubDate><media:content url="https://www.ccnet.de/en/blog/content/images/2026/02/EN-7.png" medium="image"/><content:encoded><![CDATA[<img src="https://www.ccnet.de/en/blog/content/images/2026/02/EN-7.png" alt="NIS2: Who is affected? Directly, indirectly &#x2013; and through the supply chain"><p>Many organizations misjudge their risk under <strong>NIS-2</strong>. Not because they are uninformed, but because they focus only on formal thresholds: sector, size, legal definitions. In reality, exposure arises in three ways &#x2013; and two of them work without a formal notification. Those who ignore this will, in a crisis, lack <strong>evidence</strong>, contractual safeguards for the <strong>supply chain</strong>, and practiced reporting channels.</p>
<h2 id="the-three-paths-of-exposure">The three paths of exposure</h2>
<ol>
<li><strong>Directly affected</strong>: Companies formally classified as &#x201C;essential&#x201D; or &#x201C;important.&#x201D; They carry explicit obligations regarding <strong>governance</strong>, risk management, technical/organizational measures, and <strong>incident</strong> reporting.</li>
<li><strong>Indirectly affected</strong>: Service providers and suppliers working for directly affected customers. Requirements are passed down contractually: minimum controls (e.g., phishing-resistant MFA, patch SLOs), <strong>audit</strong> and evidence rights, reporting deadlines, emergency contacts.</li>
<li><strong>Factually affected</strong>: Companies without formal classification whose failure would block critical customer processes. At the latest during onboarding or recertification, they are required to implement the same controls &#x2013; or lose contracts.</li>
</ol>
<p>The distinction is legally relevant, but operationally secondary: in all three cases, you must demonstrate that your <strong>IT security</strong> is adequate, documented, and effective.</p>
<h2 id="why-size-is-not-the-criterion">Why size is not the criterion</h2>
<p>Acute exposure arises from chains of impact: if your system goes down and production, logistics, or public services of a customer fail as a result, it is not your headcount that matters, but the dependency. Typical triggers include internet-exposed interfaces, admin access to customer systems, processing of sensitive data, or operational responsibility for central platforms. In short: anyone enabling or influencing a critical function will be assessed &#x2013; formally or contractually.</p>
<h2 id="indirect-pressure-compliance-%E2%80%9Ctop-down%E2%80%9D">Indirect pressure: compliance &#x201C;top-down&#x201D;</h2>
<p>Directly affected clients pass obligations down their <strong>supply chain</strong>. This is not a &#x201C;nice to have,&#x201D; but a survival strategy: a weakness at a service provider is a weakness in one&#x2019;s own audit. Clear minimum standards are therefore expected &#x2013; without vendor names, but with verifiable impact:</p>
<ul>
<li><strong>Identities first</strong>: phishing-resistant MFA for privileged roles, deactivation of weak legacy protocols.</li>
<li><strong>Patch discipline</strong>: binding deadlines based on exposure (internet vs. internal), documented exceptions with compensating controls.</li>
<li><strong>Backups with proof</strong>: integrity verification and time-measured restoration.</li>
<li><strong>Reporting path &amp; contacts</strong>: 24/7 contact, defined thresholds, log of initial notification.</li>
<li><strong>Logging</strong>: traceable logs of critical access and changes &#x2013; audit-proof, purpose-bound.</li>
</ul>
<p>Those who can deliver this pass onboarding; those who cannot are removed from shortlists &#x2013; regardless of formal NIS-2 classification.</p>
<h2 id="common-misconceptions-%E2%80%93-soberly-refuted">Common misconceptions &#x2013; soberly refuted</h2>
<ul>
<li><strong>&#x201C;We are too small.&#x201D;</strong> &#x2013; Until a major customer classifies your platform as critical. Then their rules apply immediately.</li>
<li><strong>&#x201C;A certificate is enough.&#x201D;</strong> &#x2013; No. Certificates help, but they do not replace lived processes, <strong>audits</strong>, and <strong>evidence</strong>.</li>
<li><strong>&#x201C;We will report later, once everything is clear.&#x201D;</strong> &#x2013; Reporting obligations require early, structured initial notifications with updates.</li>
<li><strong>&#x201C;IT handles that.&#x201D;</strong> &#x2013; <strong>NIS-2</strong> addresses management responsibilities. Budget, risks, and escalations are <strong>governance</strong> issues.</li>
</ul>
<h2 id="what-makes-sense-now-without-activism">What makes sense now (without activism)</h2>
<p>Start where failure is costly and create proof instead of declarations of intent:</p>
<ul>
<li><strong>Risk map &amp; responsibilities</strong>: Which services are critical for customers? Who decides during an incident? Written, approved, accessible.</li>
<li><strong>Control runbooks</strong>: One page per measure: objective, trigger, steps, owner, evidence (screens, logs, tickets).</li>
<li><strong>Supply chain tiering model</strong>: Desk review for all, remote evidence for &#x201C;high,&#x201D; targeted testing for &#x201C;critical.&#x201D; Deadlines and escalation defined contractually.</li>
<li><strong>Incident communication</strong>: Templates and contact matrices (internal/external), thresholds, out-of-band channels &#x2013; rehearsed once, not just described.</li>
<li><strong>Evidence discipline</strong>: &#x201C;Not documented&#x201D; counts as &#x201C;did not happen&#x201D; in an audit. Collect, version, store centrally.</li>
</ul>
<h2 id="kpis-that-hold-up-under-scrutiny">KPIs that hold up under scrutiny</h2>
<ul>
<li><strong>MFA coverage (phishing-resistant)</strong> for privileged roles.</li>
<li><strong>Patch SLO compliance</strong> separated by internet-exposed/internal.</li>
<li><strong>Restore time &amp; integrity verification</strong> for two business-critical processes.</li>
<li><strong>Time to initial notification</strong> and completeness of <strong>incident</strong> first information.</li>
<li><strong>Supply chain fitness</strong>: share of critical partners with up-to-date evidence and functioning 24/7 contact.</li>
</ul>
<p>These KPIs are not an end in themselves; every deviation requires a defined consequence (escalation, change freeze, additional review). Only then does <strong>governance</strong> become effective.</p>
<h2 id="conclusion">Conclusion</h2>
<p>The question &#x201C;Are we formally NIS-2?&#x201D; is important &#x2013; but not decisive. What matters is whether you can demonstrate that your controls are appropriate, functioning, and resiliently documented in an emergency. Directly, indirectly, or factually affected: the outcome is what counts. Those who clarify responsibilities today, write runbooks, contractually secure the <strong>supply chain</strong>, and collect evidence will not only pass the next <strong>audit</strong> &#x2013; they will materially reduce the real risk of outages and follow-up costs.</p>
<h2 id="faq-about-blog-post">FAQ about blog post</h2>
<div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><b><strong style="white-space: pre-wrap;">Who is affected by NIS-2 &#x2013; only directly listed companies?</strong></b></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">No. In addition to formally classified entities, service providers and suppliers are indirectly affected through contractual requirements and supply chain obligations.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><b><strong style="white-space: pre-wrap;">What triggers NIS-2 exposure?</strong></b></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">Common triggers include admin access to customer systems, processing of sensitive data, and critical operational dependencies.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><b><strong style="white-space: pre-wrap;">How can a company prove adequate IT security under NIS-2?</strong></b></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">Through measurable KPIs such as MFA coverage, patch SLO compliance, documented restore tests, and structured incident metrics.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><b><strong style="white-space: pre-wrap;">What do customers require in the context of NIS-2?</strong></b></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">They expect verifiable evidence, contractual audit rights, defined reporting deadlines, and established 24/7 contact channels.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><b><strong style="white-space: pre-wrap;">What is the most common misconception about NIS-2?</strong></b></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">&#x201C;We are too small.&#x201D; This assumption fails when a company&#x2019;s outage disrupts critical customer operations.</span></p></div>
        </div>]]></content:encoded></item><item><title><![CDATA[NIS-2: Legal Uncertainty Is No Excuse]]></title><description><![CDATA[<h2 id="what-it%E2%80%99s-really-about">What It&#x2019;s Really About</h2>
<p>The discussion around <strong>NIS-2</strong> often revolves around detailed regulations and interpretative questions. Understandable &#x2013; but dangerous. Because the core has long been clear: Companies of essential importance to the economy and society must demonstrably professionalize their <strong>IT security</strong> and <strong>governance</strong>. Those who choose to</p>]]></description><link>https://www.ccnet.de/en/blog/nis-2-legal-uncertainty-is-no-excuse/</link><guid isPermaLink="false">699830981fa63d476bec215d</guid><category><![CDATA[Cybersecurity]]></category><dc:creator><![CDATA[CCNet]]></dc:creator><pubDate>Fri, 20 Feb 2026 12:00:05 GMT</pubDate><media:content url="https://www.ccnet.de/en/blog/content/images/2026/02/EN-6.png" medium="image"/><content:encoded><![CDATA[<h2 id="what-it%E2%80%99s-really-about">What It&#x2019;s Really About</h2>
<img src="https://www.ccnet.de/en/blog/content/images/2026/02/EN-6.png" alt="NIS-2: Legal Uncertainty Is No Excuse"><p>The discussion around <strong>NIS-2</strong> often revolves around detailed regulations and interpretative questions. Understandable &#x2013; but dangerous. Because the core has long been clear: Companies of essential importance to the economy and society must demonstrably professionalize their <strong>IT security</strong> and <strong>governance</strong>. Those who choose to &#x201C;wait and see&#x201D; now risk exactly what NIS-2 addresses: longer outages, chain reactions in the <strong>supply chain</strong>, and executive liability without solid evidence of appropriate measures.</p>
<h2 id="the-essence-of-nis-2-in-five-points">The Essence of NIS-2 in Five Points</h2>
<ul>
<li><strong>Management Responsibility:</strong> Executive management/board is explicitly obligated to understand risks, approve measures, and have their effectiveness reviewed.</li>
<li><strong>Risk-Based Controls:</strong> Not checklist religion, but appropriate, documented measures across identities, endpoints, networks, applications, and data.</li>
<li><strong>Reporting Obligations &amp; <strong>Incident Reporting</strong></strong>: Serious incidents must be reported in a timely and qualified manner &#x2013; without panic, but with facts.</li>
<li><strong>Supply Chain Security:</strong> Third parties are not &#x201C;outside&#x201D; &#x2013; they are part of your attack surface. Minimum controls and evidence are contractually required.</li>
<li><strong>Enforcement &amp; Sanctions:</strong> &#x201C;Paper security&#x201D; is not enough. Missing <strong>governance</strong> and ineffective processes are subject to sanctions &#x2013; regardless of good intentions.</li>
</ul>
<h2 id="who-is-affected-%E2%80%93-directly-indirectly-through-contracts">Who Is Affected &#x2013; Directly, Indirectly, Through Contracts</h2>
<p>Many companies fall directly within the scope; others feel <strong>NIS-2</strong> through their customers: Large clients and operators demand evidence and audit rights, even if you are not formally &#x201C;in scope.&#x201D; Realistically, there are three classes:</p>
<ol>
<li><strong>Directly affected</strong> (essential/important entities): formal obligations and regulatory contact.</li>
<li><strong>Indirectly affected</strong> (critical suppliers/service providers): contractual evidence obligations, audits, minimum standards.</li>
<li><strong>De facto affected:</strong> no formal classification, but dependent on customers who pass down NIS-2 requirements.</li>
</ol>
<h2 id="common-misconceptions-%E2%80%93-and-the-sober-answer">Common Misconceptions &#x2013; and the Sober Answer</h2>
<ul>
<li><strong>&#x201C;We need the final official guidance first.&#x201D;</strong> &#x2013; Wrong. The expected controls have been best practice for years: phishing-resistant MFA, patch SLOs, segmentation, backups with integrity verification, <strong>Incident Reporting</strong> process.</li>
<li><strong>&#x201C;Certificate = done.&#x201D;</strong> &#x2013; No. Certificates help, but they do not replace lived processes or supply chain controls.</li>
<li><strong>&#x201C;Our IT will handle it.&#x201D;</strong> &#x2013; Half true. NIS-2 is <strong>governance</strong>: risk decisions, budget, contracts, escalation &#x2013; that is an executive responsibility.</li>
<li><strong>&#x201C;We are too small/unimportant.&#x201D;</strong> &#x2013; Until an outage affects a customer who is very important. Then their rules apply &#x2013; immediately.</li>
</ul>
<h2 id="from-legal-text-to-practice-%E2%80%93-what-%E2%80%9Cappropriate%E2%80%9D-looks-like">From Legal Text to Practice &#x2013; What &#x201C;Appropriate&#x201D; Looks Like</h2>
<p>Start where failure is most expensive: identities, external attack surfaces, and recovery. &#x201C;Appropriate&#x201D; means: documented, repeatable, tested.</p>
<p><strong>Core building blocks that matter:</strong></p>
<ul>
<li><strong>Identities first:</strong> Phishing-resistant MFA (e.g., Passkeys/FIDO2) for critical roles, just-in-time privileges, disabling weak legacy protocols.</li>
<li><strong>Patch SLOs instead of &#x201C;we patch regularly&#x201D;:</strong> Internet-exposed critical issues in days, internal with clear deadlines; escalation for delays is automated, not manual.</li>
<li><strong>Segmentation &amp; Hardening:</strong> Separation of critical zones, hardened admin workstations, default blocking of risky scripting tools.</li>
<li><strong>Backups with proof:</strong> Offline/immutable, time-measured restore drills including integrity verification &#x2013; documented and repeatable.</li>
<li><strong>Reporting &amp; communication path:</strong> A practiced <strong>Incident Reporting</strong> process with roles, deadlines, contact paths (internal/external), legal guardrails.</li>
<li><strong>Contractually secure the supply chain:</strong> Minimum controls (MFA, patch SLOs, logging), drill obligations, reporting deadlines, audit rights.</li>
</ul>
<h2 id="minimal-roadmap-without-drama">Minimal Roadmap Without Drama</h2>
<p>Not everything at once &#x2013; but consistently and with evidence.</p>
<ol>
<li>
<p><strong>Risk map &amp; responsibilities (management resolution):</strong><br>
Which processes are critical? Which attack paths are realistic? Who decides on deviations? Document it and formally approve it at executive level.</p>
</li>
<li>
<p><strong>Controls into the operations manual (not just into slides):</strong><br>
For each control (e.g., MFA, patch SLO, restore drill) a one-page runbook: objective, trigger, steps, owner, evidence. No novel &#x2013; but operational.</p>
</li>
<li>
<p><strong>Collect and version evidence:</strong><br>
Tickets, logs, screenshots, drill records. Without evidence, it did not happen. Centralized, audit-proof, searchable.</p>
</li>
<li>
<p><strong>Supply chain in tiers:</strong><br>
Desk review for all, remote audit for &#x201C;high,&#x201D; targeted tests for &#x201C;critical.&#x201D; Missing evidence &#x21D2; deadline, escalation, if necessary access restriction.</p>
</li>
</ol>
<h2 id="what-is-measured-%E2%80%93-and-how">What Is Measured &#x2013; and How</h2>
<p>Metrics do not replace control, but they make progress visible &#x2013; and failures measurable. Focus on a few hard KPIs with clear consequences for deviations:</p>
<ul>
<li><strong>MFA coverage (phishing-resistant)</strong> for critical roles.</li>
<li><strong>Patch SLO compliance</strong> by exposure (Internet vs. internal).</li>
<li><strong>Restore time &amp; integrity</strong> for the two most critical business processes.</li>
<li><strong>Incident maturity:</strong> time to initial assessment, time to report, completeness of initial notification.</li>
<li><strong>Supply chain fitness:</strong> percentage of critical partners with verified evidence/drills and functioning 24/7 contact path.</li>
</ul>
<p>Important: Every deviation requires a defined consequence (e.g., escalation, change freeze, additional review). Reporting without action is busywork.</p>
<h2 id="practical-advice-for-skeptical-executives">Practical Advice for Skeptical Executives</h2>
<ul>
<li><strong>Ask for evidence, not intentions.</strong> &#x201C;Show me the last restore protocol with timestamp.&#x201D;</li>
<li><strong>Prioritize where time equals money.</strong> A stable recovery reduces <strong>downtime costs</strong> &#x2013; and convinces insurers.</li>
<li><strong>Tie budget to impact.</strong> Fewer tools, more resilient processes.</li>
<li><strong>Make it audit-ready.</strong> Anything that cannot be found effectively does not exist &#x2013; especially under <strong>NIS-2</strong>.</li>
</ul>
<h2 id="conclusion-action-beats-excuses">Conclusion: Action Beats Excuses</h2>
<p><strong>NIS-2</strong> is not an end in itself, but a catalyst for solid <strong>governance</strong>. Those who put processes, evidence, and the <strong>supply chain</strong> in order today win twice: less day-to-day risk and less stress when it matters. Waiting for perfect clarity is a strategy &#x2013; just not a good one. The requirements are known, the path is feasible. Start now &#x2013; and document that you did.</p>
<h2 id="faq-about-blog-post">FAQ about Blog post</h2>
<div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><b><strong style="white-space: pre-wrap;">What does NIS-2 specifically regulate for companies?</strong></b></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">NIS-2 requires clear management responsibilities, verifiable effectiveness evidence, and structured supply chain controls. IT security measures must be documented, tested, and demonstrably compliant toward authorities.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><b><strong style="white-space: pre-wrap;">Which processes must be regularly practiced under NIS-2?</strong></b></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">A functioning incident reporting process, tested restore procedures with integrity verification, and defined communication paths with authorities must be regularly exercised and documented.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><b><strong style="white-space: pre-wrap;">Is a certificate sufficient to comply with NIS-2?</strong></b></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">No. A certificate alone is not sufficient. Operational processes, documented controls, and verifiable evidence are essential.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><b><strong style="white-space: pre-wrap;">Who is responsible for implementing NIS-2?</strong></b></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">Responsibility lies with executive management in cooperation with security and legal functions. NIS-2 is a governance matter, not just an IT task.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><b><strong style="white-space: pre-wrap;">What are quick steps to start NIS-2 compliance?</strong></b></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">Create operational runbooks, establish a centralized evidence repository, and implement a structured supply chain tiering model for audits and minimum controls.</span></p></div>
        </div>]]></content:encoded></item><item><title><![CDATA[Biometrics & MFA: What Really Brings Security]]></title><description><![CDATA[Biometrics and MFA are crucial for digital security. Learn how they protect against phishing and are properly implemented.]]></description><link>https://www.ccnet.de/en/blog/biometrics-mfa-what-really-brings-security/</link><guid isPermaLink="false">699488221fa63d476bec213e</guid><category><![CDATA[Cybersecurity]]></category><dc:creator><![CDATA[CCNet]]></dc:creator><pubDate>Wed, 18 Feb 2026 09:00:19 GMT</pubDate><media:content url="https://www.ccnet.de/en/blog/content/images/2026/02/EN-1-.png" medium="image"/><content:encoded><![CDATA[<h2 id="what-its-really-about">What It&apos;s Really About</h2>
<img src="https://www.ccnet.de/en/blog/content/images/2026/02/EN-1-.png" alt="Biometrics &amp; MFA: What Really Brings Security"><p>Anyone still believing that a password plus &quot;something with push&quot; is sufficient hasn&apos;t understood the reality of attacks. Attackers don&apos;t just steal passwords anymore; they hijack sessions, exploit weak devices, bypass SMS codes, and use so-called Adversary-in-the-Middle chains to hijack logins in real-time. <strong>MFA</strong> is therefore not a &quot;nice-to-have,&quot; but the minimum to increase the cost per attack. But: <strong>MFA</strong> is not the same as <strong>MFA</strong>. Between phishing-prone methods (e.g., one-time codes, freely confirmable pushes) and phishing-secure methods (e.g., <strong>Passkeys</strong>/FIDO2 with device binding) lies a security chasm. Cutting corners in the wrong place buys a false sense of security &#x2013; and costs double in the event of an incident: in time and <strong>downtime costs</strong>.</p>
<h2 id="biometrics-without-romance">Biometrics Without Romance</h2>
<p><strong>Biometrics</strong> works because it links the &quot;possession&quot; factor to a specific, registered device while simultaneously utilizing the &quot;inherence&quot; factor (e.g., finger, face) to make local unlocking secure and fast. But biometrics is no magic spell. The key point is <em>where</em> the verification happens and <em>how</em> the cryptographic proof looks. If unlocking occurs locally in the device&apos;s secure element, and the private key never leaves its boundaries, a qualitatively different level of protection is achieved compared to solutions that evaluate biometric data server-side or send simple app approvals. When implemented correctly, <strong>biometrics</strong> brings speed for users and integrity for the organization: fewer password resets, less social engineering exposure, less friction in daily operations. When done wrong, it creates new risks: questionable enrollments, insecure devices, lack of policies for loss cases, and no proper fallback if the sensors fail.</p>
<h2 id="why-phishing-secure-mfa-makes-the-difference">Why Phishing-Secure MFA Makes the Difference</h2>
<p>Phishable methods can be deceived because the human in the loop cannot verify the authenticity of the counterpart. A fake login portal, a forwarded one-time code &#x2013; and the attacker is in the session. Phishing-secure <strong>MFA</strong> cryptographically binds the login to the legitimate website or app. This means that even if a user willingly &quot;confirms,&quot; the confirmation cannot be redirected to another domain. <strong>Zero Trust</strong> becomes tangible here: don&apos;t trust, verify; don&apos;t trust globally, but bind to context &#x2013; identity, device, application. In practice, this shows up in attacks with very little negotiation room: without the correct private key <em>and</em> the proper counterpart, the door stays locked. This is the difference between &quot;we had MFA&quot; and &quot;the attack failed technically.&quot;</p>
<h2 id="the-uncomfortable-questions-about-your-own-implementation">The Uncomfortable Questions About Your Own Implementation</h2>
<p>Anyone serious about security doesn&apos;t just roll out buzzwords, but answers a few uncomfortable questions: Where do we still accept SMS codes or email links &#x2013; and why? Where do we allow push confirmations without contextual binding? Which privileged roles (Admin, Finance, HR, Developers) have already switched to phishing-secure <strong>MFA</strong>, and which have not? How do we handle &quot;Legacy&quot; &#x2013; services that can only do basic authentication? And what happens if devices are lost: Is the recovery process documented, verifiable, and fast, or do we improvise? These answers determine the actual <strong>cyber risk</strong>, not the number of licenses.</p>
<h2 id="practical-guide-without-hype">Practical Guide Without Hype</h2>
<p>The path is clear and free of religion. First: start where a breach would hurt the most &#x2013; privileged roles and externally exposed access points. Second: Replace weak factors with strong ones. <strong>MFA</strong> with <strong>Passkeys</strong> or FIDO2 security keys on corporate devices drastically reduces phishing success because the login and target page are cryptographically linked. Third: Enforce session hygiene. A strong login is useless if a stolen token lives for weeks. Therefore, set short session durations, re-challenges at risk (unusual location, new device, sensitive process), and clear revocation mechanisms. Fourth: Regulate fallbacks. No procedure is perfect. The secure emergency path must be rare, short, and strict &#x2013; time-limited, clearly approved, and revoked immediately afterward. Fifth: Don&apos;t forget the machines. Service accounts, CI/CD tokens, and IoT devices also need strong, short-lived login credentials and mTLS-based connections, or the backdoor remains open.</p>
<h2 id="what-can-be-measured-can-be-improved">What Can Be Measured Can Be Improved</h2>
<p>Metrics are not an end in themselves, but without numbers, everything is just a feeling. Useful metrics include the coverage of phishing-secure <strong>MFA</strong> for critical roles, the average session life in sensitive applications, the time from device loss to complete revocation of all access, the rate of blocked login attempts through domain binding, and the percentage of privileged actions that require additional step-up verification. What matters is consistency: a deviation should not trigger &quot;we are observing,&quot; but a predefined action &#x2013; block, rotate, refine.</p>
<h2 id="conclusion-speed-plus-integrity">Conclusion: Speed Plus Integrity</h2>
<p>The best <strong>IT security</strong> is the one that&apos;s used &#x2013; daily, without friction, without excuses. <strong>Biometrics</strong> and phishing-secure <strong>MFA</strong> deliver just that when implemented correctly: fast logins, strong binding to legitimate targets, clear revocation paths. Those who consistently switch today reduce the attack surface, shorten response time, and lower hidden costs that would otherwise seep into helpdesk, forensics, and downtime. Everything else is just cosmetics &#x2013; and cosmetics have never stopped an attack.</p>
]]></content:encoded></item><item><title><![CDATA[Non-human identities: The overlooked keys]]></title><description><![CDATA[Why machine identities and service accounts are the biggest blind risk.]]></description><link>https://www.ccnet.de/en/blog/non-human-identities-the-overlooked-keys/</link><guid isPermaLink="false">6992d4381fa63d476bec2125</guid><category><![CDATA[Cybersecurity]]></category><dc:creator><![CDATA[CCNet]]></dc:creator><pubDate>Mon, 16 Feb 2026 09:00:38 GMT</pubDate><media:content url="https://www.ccnet.de/en/blog/content/images/2026/02/EN-5.png" medium="image"/><content:encoded><![CDATA[<h2 id="management-summary">Management Summary</h2>
<img src="https://www.ccnet.de/en/blog/content/images/2026/02/EN-5.png" alt="Non-human identities: The overlooked keys"><p>Honest assessment: In many environments, <strong>machine identities</strong> are more dangerous than user accounts. <strong>Service accounts</strong> with standing privileges, hard-coded secrets, eternal tokens, and missing telemetry are perfect entry points &#x2013; invisible, convenient, often declared &#x201C;technically necessary.&#x201D; Anyone serious about <strong>Zero Trust</strong> must not only verify humans, but workloads, services, and devices as well. The path is clear: consistent inventory, minimal privileges, short-lived credentials, strict <strong>secrets rotation</strong>, and enforced <strong>mTLS</strong> &#x2013; proven by KPIs, not by statements of intent.</p>
<h2 id="why-non-human-identities-are-underestimated">Why non-human identities are underestimated</h2>
<ul>
<li><strong>Invisibility in daily operations:</strong> There is no employee who &#x201C;clicks the wrong thing.&#x201D; Therefore <strong>service accounts</strong> rarely appear in awareness programs &#x2013; and slip through every control.</li>
<li><strong>Convenience vs. security:</strong> Standing privileges and static passwords &#x201C;just work.&#x201D; Until they are copied, leaked, or pulled from repos.</li>
<li><strong>Scaling effect:</strong> A compromised build token or IoT certificate opens entire fleets &#x2013; lateral movement without alarms.</li>
<li><strong>Lack of ownership:</strong> Who &#x201C;owns&#x201D; the account? Dev? Ops? Business unit? Without a clear owner, everything gets neglected.</li>
</ul>
<h2 id="typical-weaknesses">Typical weaknesses</h2>
<ul>
<li><strong>Hard-coded secrets</strong> in code, CI/CD variables, IaC templates &#x2192; enforced secret scanning, plaintext bans, central secrets store, <strong>secrets rotation</strong> &#x2264; 30 days.</li>
<li><strong>Long-lived tokens/certificates</strong> &#x2192; short-lived, signed workload identities; automatic renewal, revocation on anomalies.</li>
<li><strong>Overprivileged <strong>service accounts</strong></strong> &#x2192; strict scopes, <strong>least privilege</strong>, time- or event-based access; no shared accounts.</li>
<li><strong>Missing transport security</strong> between services &#x2192; mandatory <strong>mTLS</strong> (mutual verification) with automatic certificate rotation.</li>
<li><strong>No inventory/no telemetry</strong> &#x2192; central registry for <strong>machine identities</strong>, usage and issuance logs, alerts for &#x201C;impossible&#x201D; patterns.</li>
</ul>
<h2 id="principles-for-resilient-machine-identity">Principles for resilient machine identity</h2>
<ol>
<li><strong>Explicit existence:</strong> Every non-human identity is registered (owner, purpose, scope, expiration date).</li>
<li><strong>Short-lived over comfort:</strong> Tokens/certificates live hours&#x2013;days, not months. Rotation is mandatory, not a project goal.</li>
<li><strong>Trust is provable:</strong> <strong>mTLS</strong> + signatures + attestations; no &#x201C;we believe that &#x2026;&#x201D;.</li>
<li><strong>Least privilege by design:</strong> Permissions are specific, clearly separated, and expire automatically.</li>
<li><strong>Detectability:</strong> Every use leaves correlation (identity &#xD7; target &#xD7; time &#xD7; source) &#x2013; otherwise no deployment.</li>
</ol>
<h2 id="90-day-plan">90-day plan</h2>
<p><strong>Day 0&#x2013;15 &#x2013; Visibility &amp; stop criteria</strong></p>
<ul>
<li>Full inventory of all <strong>service accounts</strong>, tokens, certificates, API keys (incl. owner, scope, expiration).</li>
<li>Policies: ban hard-coded secrets; minimal lifetimes; mandatory <strong>mTLS</strong> for internal service-to-service paths.</li>
<li>Establish baseline KPIs (see below).</li>
</ul>
<p><strong>Day 16&#x2013;45 &#x2013; Hardening &amp; short-lived credentials</strong></p>
<ul>
<li>Introduce/standardize a central secrets store; start automated <strong>secrets rotation</strong>.</li>
<li>Short-lived workload identities (signed, time-limited credentials) for the top 3 critical services.</li>
<li>Enable <strong>mTLS</strong> on critical paths (mutual verification, auto-renew).</li>
</ul>
<p><strong>Day 46&#x2013;75 &#x2013; Automate &amp; delete</strong></p>
<ul>
<li>CI/CD gates: builds fail on hard-coded secrets, expired certificates, oversized scopes.</li>
<li>Privilege diet: reduce overprivileged <strong>service accounts</strong>; delete unused identities.</li>
<li>Anomaly detection: unusual usage (time, source, volume) &#x2192; auto-revoke + pager.</li>
</ul>
<p><strong>Day 76&#x2013;90 &#x2013; Anchor &amp; prove</strong></p>
<ul>
<li>Lock in rotation cycles (&#x2264; 30 days tokens, &#x2264; 90 days certificates &#x2013; depending on risk).</li>
<li>Test break-glass process for machine identities (issue, use, revoke, audit).</li>
<li>Quarterly steering with KPIs; tie budget to impact (e.g., &#x201C;pinned rate,&#x201D; &#x201C;rotation rate&#x201D;).</li>
</ul>
<h2 id="kpis-that-make-maturity-measurable">KPIs that make maturity measurable</h2>
<ul>
<li><strong>Inventory coverage:</strong> % of registered <strong>machine identities</strong> with owner, scope, expiration date.</li>
<li><strong>Rotation rate:</strong> % of secrets/certificates rotated within target cycles.</li>
<li><strong>Short-lived score:</strong> Median lifetime of tokens/certificates by criticality.</li>
<li><strong>mTLS coverage:</strong> % of critical service paths with enforced <strong>mTLS</strong> (incl. mutual verification).</li>
<li><strong>Scope hygiene:</strong> Share of <strong>service accounts</strong> with minimal privileges (no wildcards, no admin-all).</li>
<li><strong>Leak/find rate:</strong> Number of secrets found per month and time to revocation/rotation.</li>
</ul>
<h2 id="anti-patterns">Anti-patterns</h2>
<ul>
<li><strong>&#x201C;Technically necessary&#x201D;</strong> as an excuse for standing privileges &#x2013; no. Prove the necessity, limit it, compensate the risk.</li>
<li><strong>&#x201C;mTLS later&#x201D;</strong> &#x2013; later means never. Without mutual verification, the &#x201C;internal&#x201D; network is an open field.</li>
<li><strong>&#x201C;Dev environment only&#x201D;</strong> &#x2013; attackers love dev: real data models, real keys, little monitoring.</li>
<li><strong>&#x201C;We don&#x2019;t log &#x2013; data protection&#x201D;</strong> &#x2013; data protection is not a logging ban. Log sparingly, but verifiably.</li>
</ul>
<h2 id="practical-checklist">Practical checklist</h2>
<ul>
<li>Enforce secret scanning in all repos/CI pipelines; fail builds on findings.</li>
<li>Central secrets store with <strong>secrets rotation</strong> and short-lived leases (just-in-time for services).</li>
<li><strong>mTLS</strong> mandatory for internal services; automatic certificate issuance/renewal.</li>
<li>Permission reviews for <strong>service accounts</strong>: minimize scopes, set expirations, assign owners.</li>
<li>Telemetry requirement: correlate usage per identity; auto-revoke on anomalies.</li>
<li>Deletion discipline: remove unused machine identities &#x2013; monthly cadence.</li>
</ul>
<h2 id="conclusion-identity-is-more-than-human">Conclusion: identity is more than human</h2>
<p>Anyone who only hardens users builds a steel front door &#x2013; and leaves the side door open. <strong>Machine identities</strong> are now the number one realistic attack route: quiet, scalable, often without alarms. With short-lived credentials, strict scopes, mandatory <strong>mTLS</strong>, practiced <strong>secrets rotation</strong>, and solid KPIs, gut feeling turns into controlled security. Anything else is expensive hope.</p>
<h2 id="faq-about-blog-post">FAQ about blog post</h2>
<div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><span style="white-space: pre-wrap;">What is the main problem with machine identities and service accounts?</span></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">The main risk comes from service accounts with standing privileges and hard-coded secrets, as they allow long-term and often unnoticed access for attackers.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><span style="white-space: pre-wrap;">How can you reduce the security risk of service accounts?</span></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">Risk is reduced by using short-lived tokens, enforcing mTLS, and performing secrets rotation every 30 to 90 days.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><span style="white-space: pre-wrap;">Who owns machine accounts in an organization?</span></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">Every machine account should have a defined owner, clear scopes, and an expiration date.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><span style="white-space: pre-wrap;">How can misuse of machine identities be detected?</span></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">Misuse can be detected through usage correlation by identity, target, and time, plus automatic revocation on anomalies.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><span style="white-space: pre-wrap;">Which security policy is mandatory for secrets?</span></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">A critical policy is to fail builds when secrets are detected or when commits are unsigned.</span></p></div>
        </div>]]></content:encoded></item><item><title><![CDATA[Identities are the new perimeter From network fencing to zero trust]]></title><description><![CDATA[How companies pragmatically manage risks from software supply chains and open source: SBOM, guidelines for supply chain security, KPIs, and a 90-day plan]]></description><link>https://www.ccnet.de/en/blog/identities-are-the-new-perimeter-from-network-fencing-to-zero-trust/</link><guid isPermaLink="false">698ee00a1fa63d476bec20f8</guid><category><![CDATA[Cybersecurity]]></category><dc:creator><![CDATA[CCNet]]></dc:creator><pubDate>Fri, 13 Feb 2026 09:00:33 GMT</pubDate><media:content url="https://www.ccnet.de/en/blog/content/images/2026/02/EN-4.png" medium="image"/><content:encoded><![CDATA[<img src="https://www.ccnet.de/en/blog/content/images/2026/02/EN-4.png" alt="Identities are the new perimeter From network fencing to zero trust"><p>Management Summary</p>
<p>The era of network perimeters is over. Attacks start via email, browsers, remote access, identities, and services that never see your LAN. Those who still romanticize packet filters lose in speed and visibility. The way forward is unglamorous: Zero Trust as an operating principle (&#x201E;verify instead of trust&#x201C;), strong MFA, consistent Least Privilege, short-lived permissions ( JIT-Access ) and telemetry that ties anomalies to identity. Result: faster detection, less lateral movement, lower downtime costs.</p>
<p>Why the classic perimeter fails</p>
<p>Hybrid reality: SaaS, remote work, partner access &#x2013; the &#x201C;inside&#x201D; effectively no longer exists.<br>
Session theft instead of password guessing: modern phishing chains target tokens and cookies, not just passwords.<br>
Machine accounts are exploding: service IDs, CI/CD tokens, IoT &#x2013; often with permanent rights, rarely monitored.<br>
Change velocity: new apps and integrations appear faster than firewall rules can keep up.</p>
<p>Conclusion: control must move to the identity &#x2013; human and machine.</p>
<p>Zero Trust in five pillars</p>
<p>Identity &#x2013; Who wants what? Humans, services, devices. Strong MFA, robust recovery processes, strict session policies (re-challenge, device binding).<br>
Device &#x2013; From what is access happening? Compliance status, patch level, risk signals. Non-compliant devices: restricted mode.<br>
Network &#x2013; Only transport layer and micro-segmentation; no implicit trust zones.<br>
Workload/Application &#x2013; Gate in front of every sensitive flow (AuthN/Z, rate limits, secrets hygiene).<br>
Data &#x2013; Classification, minimal permissions, context-dependent approvals, logging.</p>
<p>Principles: explicit verification, Least Privilege, assume compromise, telemetry-first.</p>
<p>90-day plan: from intention to lived control</p>
<p>Day 0&#x2013;15 &#x2013; Situation overview and tough decisions<br>
Role mapping: admin, finance, developer, third-party accounts. What is business-critical?<br>
Auth inventory: where is phishing-resistant MFA missing? Which legacy flows are still active (for example IMAP/POP, Basic/NTLM)?<br>
Policy outline: access decisions will be based on identity plus device state plus context.</p>
<p>Day 16&#x2013;45 &#x2013; Hardening and shutdowns<br>
MFA for all critical roles; disable legacy protocols; session re-challenge on risk.<br>
Pilot JIT-Access: temporary admin rights with ticket or four-eyes approval; maximum duration in minutes or hours.<br>
Secrets rotation: move service accounts to short-lived tokens; eliminate hard-coded passwords.</p>
<p>Day 46&#x2013;75 &#x2013; Automate and gain visibility<br>
Encode access decisions into policies (policy engine): identity &#xD7; device &#xD7; location &#xD7; sensitivity.<br>
Identity-based anomaly detection: unusual travel, impossible logins, deviation from role profile leading to auto-containment (session kill, step-up authentication).<br>
Test break-glass process: emergency accounts, logged usage, immediate rotation.</p>
<p>Day 76&#x2013;90 &#x2013; Anchor and measure<br>
Role cleanup (RBAC/ABAC): close orphaned accounts, reduce over-privileged groups.<br>
Developer path: forbid secrets in code, enforce signatures, short-lived CI/CD tokens.<br>
Quarterly steering: lock in targets (for example 100 % MFA for critical roles, 90 % JIT-Access for admin actions).</p>
<p>KPIs that truly drive decisions</p>
<p>MFA coverage (phishing-resistant): share of critical roles with strong factors.<br>
JIT rate: percentage of privileged actions approved on a time basis.<br>
Excess privilege rate: accounts with rights beyond their role profile.<br>
Mean Time to Revoke: time from offboarding or role change to rights removal.<br>
Session anomalies: detected, automatically contained, manually confirmed &#x2013; depending on criticality.<br>
Machine identities: share of short-lived tokens, rotation intervals, secrets findings per month.</p>
<p>Anti-patterns</p>
<p>&#x201E;We have MFA&#x201C; &#x2013; but allowing push spamming and legacy fallbacks. Result: false security.<br>
&#x201E;Once admin, always admin&#x201C; &#x2013; permanent rights invite lateral movement. Least Privilege is not a poster, it is removal.<br>
&#x201E;Forgetting service accounts&#x201C; &#x2013; static passwords, never rotated, all-powerful. That is a silent backdoor.<br>
&#x201E;The network is secure enough&#x201C; &#x2013; until a browser tab with a stolen cookie becomes proof-of-admin.<br>
&#x201E;Backups = reassurance&#x201C; &#x2013; without identity hardening, attackers simply return after restore.</p>
<p>Practical checklist (immediately actionable)</p>
<p>Phishing-resistant MFA (passkeys/FIDO2) for admin, finance, HR, and developer roles.<br>
Least Privilege: role reviews, removal of unnecessary rights, peer approvals.<br>
JIT-Access: time limits, ticket binding, full logging, auto-revoke.<br>
Machine accounts: mTLS, short-lived tokens, secrets scanning in CI, rotation within 30 days or less.<br>
Session security: token binding to device or browser, re-challenge on risk, forced logout after anomalies.<br>
Offboarding in hours, not days; automatic rights cascade down to sub-systems.</p>
<p>Conclusion: identity first &#x2013; everything else after</p>
<p>Those who take IT security seriously build control around identities and their contexts. Zero Trust is not a project but an operating standard: strong MFA, strict Least Privilege, enforced JIT-Access, solid telemetry. This is less flashy than new tools &#x2013; but it noticeably reduces risk, MTTR, and costs. Those who start today and consistently execute the 90-day steps achieve more impact within a few quarters than with any additional &#x201E;best-of-breed&#x201C; purchase.</p>
]]></content:encoded></item><item><title><![CDATA[Practical check: Audits in the supply chain]]></title><description><![CDATA[How lean audits secure the supply chain audit depth mandatory contents KPIs 90 day plan
]]></description><link>https://www.ccnet.de/en/blog/practical-check-audits-in-the-supply-chain/</link><guid isPermaLink="false">69899bcf1fa63d476bec20b3</guid><category><![CDATA[Cybersecurity]]></category><dc:creator><![CDATA[CCNet]]></dc:creator><pubDate>Mon, 09 Feb 2026 09:00:46 GMT</pubDate><media:content url="https://www.ccnet.de/en/blog/content/images/2026/02/EN-3.png" medium="image"/><content:encoded><![CDATA[<h2 id="management-summary">Management Summary</h2>
<img src="https://www.ccnet.de/en/blog/content/images/2026/02/EN-3.png" alt="Practical check: Audits in the supply chain"><p>Those who do not assess their partners outsource <strong>third-party risks</strong>&#x2014;straight onto their own balance sheet. The way forward is not a monster project but a well-designed staged model for <strong>audits</strong>: start small, deepen based on risk, translate results into KPIs, and consistently follow up. The goal is not paperwork but impact: verified controls, clarified contact paths, tested emergency routes. Anything else is self-reassurance.</p>
<h2 id="why-many-supply-chain-assessments-fail">Why many supply chain assessments fail</h2>
<ul>
<li>Questionnaires without evidence: nice answers, zero proof.</li>
<li>Uniform audit depth: the cloud provider is treated like the regional maintenance service&#x2014;nonsense.</li>
<li>No escalation logic: findings stall, deadlines have no teeth.</li>
<li>Zero link to operational <strong>supply-chain security</strong>: no logging path, no 24/7 contacts, no drill experience.<br>
In short: formalities instead of <strong>due diligence</strong>. That does not ensure results.</li>
</ul>
<h2 id="the-staged-model-three-audit-depths-clear-triggers">The staged model: Three audit depths, clear triggers</h2>
<p><strong>Stage 1 &#x2013; Desk Review (all partners)</strong><br>
Lightweight <strong>audits</strong> with evidence: policy excerpts, certificates, process proof, named 24/7 contacts. Triggers: new supplier, annual refresh, contract changes.</p>
<p><strong>Stage 2 &#x2013; Remote Audit (high-risk services)</strong><br>
Screen sharing/interviews, system spot checks, proof of controls (e.g., MFA screens, log exports). Triggers: internet exposure, access to sensitive data, incident history.</p>
<p><strong>Stage 3 &#x2013; Onsite/Targeted Test (critical paths)</strong><br>
Substantive on-site reviews or targeted technical tests (e.g., auth flows, restore drills). Triggers: core process relevance, admin access, linkage to your emergency operations.</p>
<h2 id="mandatory-content-per-stage-concise-but-sufficient">Mandatory content per stage (concise but sufficient)</h2>
<p><strong>Stage 1 &#x2013; Must-haves</strong></p>
<ul>
<li>Company data, responsible persons, 24/7 contact route (emergency).</li>
<li>Minimum controls: phishing-resistant MFA for admins, patch SLOs, backup concept, roles/permissions.</li>
<li>Compliance evidence (if available) + validity.</li>
<li>Incident reporting path: timelines, format, contacts.</li>
<li>Logging path: what is logged, how long, how it is shared?</li>
</ul>
<p><strong>Stage 2 &#x2013; Must-haves</strong></p>
<ul>
<li>Live proof: MFA on critical access, session hardening, offboarding process.</li>
<li>Vulnerability management: cycles, SLO compliance, sample tickets.</li>
<li>Backup/restore: latest logs, integrity proof.</li>
<li>Change/deployment path: four-eyes principle, approval trails.</li>
<li>Drill evidence: customer emergency contacts involved? Yes/No + date.</li>
</ul>
<p><strong>Stage 3 &#x2013; Must-haves</strong></p>
<ul>
<li>Targeted tests: auth chain, rate limits, emergency login, out-of-band communication.</li>
<li>Restore drill under time pressure, documented times.</li>
<li>Supplier subcontractors (N-tier): who accesses what and where? Evidence.</li>
</ul>
<h2 id="kpis-that-matter-and-enforce-steering">KPIs that matter (and enforce steering)</h2>
<ul>
<li><strong>Coverage rate</strong> of assessed partners (Stage 1/2/3) by risk class.</li>
<li><strong>SLO fulfillment</strong> for findings: % closed on time, average closure time.</li>
<li><strong>Drill rate</strong>: share of critical partners with a passed 24/7 contact and restore drill &#x2264; X months.</li>
<li><strong>Incident reporting time</strong>: time from first indicator to partner notification.</li>
<li><strong>Escalation hit rate</strong>: how often defined escalation levels are used (proof of real governance).</li>
</ul>
<p>Without quarterly reviews and hard escalation, KPIs are decoration.</p>
<h2 id="90-day-plan-for-effective-supply-chain-audits">90-day plan for effective supply chain <strong>audits</strong></h2>
<p><strong>Day 0&#x2013;15 &#x2013; Inventory &amp; risk classes</strong></p>
<ul>
<li>Complete partner list with data access, exposure, admin rights.</li>
<li>Risk classes (low/medium/high/critical) based on your business processes.</li>
<li>Stage mapping: who falls into Stage 1/2/3&#x2014;with justification.</li>
</ul>
<p><strong>Day 16&#x2013;45 &#x2013; Templates &amp; evidence</strong></p>
<ul>
<li>Three lean questionnaires (S1/S2/S3) with mandatory evidence, no free-text novels.</li>
<li>Define standard evidence (screens, ticket IDs, logs, drill records).</li>
<li>Contractual anchors: evidence and drill obligations, reporting deadlines, <strong>due diligence</strong> rights.</li>
</ul>
<p><strong>Day 46&#x2013;75 &#x2013; Execution &amp; escalation</strong></p>
<ul>
<li>Stage-1 rollout to 100% of active partners.</li>
<li>Stage-2 for all &#x201C;high&#x201D;: schedule remote sessions, verify evidence.</li>
<li>Sharp escalation logic: deadline &#x2192; reminder &#x2192; management ping &#x2192; temporary access restriction.</li>
</ul>
<p><strong>Day 76&#x2013;90 &#x2013; Drills &amp; embedding</strong></p>
<ul>
<li>Stage-3 for &#x201C;critical&#x201D;: one restore drill + emergency contact test under load.</li>
<li>KPI review vs. baseline, adjust measures, roadmap for next quarter.</li>
<li>Feed lessons learned back into templates (remove/tighten questions).</li>
</ul>
<h2 id="governance-that-works%E2%80%94without-overhead">Governance that works&#x2014;without overhead</h2>
<ul>
<li>One <strong>audit</strong> owner, one system: all evidence in <em>one</em> ticket/GRC backlog, prioritized by business impact.</li>
<li>&#x201C;No evidence, no pass&#x201D;: every answer needs proof&#x2014;otherwise open.</li>
<li>N-tier visibility: critical subcontractors must be in <em>your</em> view, or the <strong>supply chain</strong> stays blind.</li>
<li>Test the emergency path: once per year together&#x2014;not just in a PDF.</li>
</ul>
<h2 id="conclusion-impact-over-paperwork">Conclusion: impact over paperwork</h2>
<p>Lean, risk-based <strong>audits</strong> are not an end in themselves. They force partners to show controls&#x2014;and you to enforce consequences. Those who approach <strong>supply-chain security</strong> this way reduce real attack surface, improve response times, and make <strong>third-party risks</strong> measurable. In short: fewer promises, more proof. Anything else is expensive cosmetics.</p>
]]></content:encoded></item><item><title><![CDATA[Software supply chains The silent gateway]]></title><description><![CDATA[How companies pragmatically manage risks from software supply chains and open source: SBOM, supply chain security guidelines, KPIs, and a 90-day plan]]></description><link>https://www.ccnet.de/en/blog/software-supply-chains-the-silent-gateway/</link><guid isPermaLink="false">6985a2ca1fa63d476bec20a1</guid><category><![CDATA[Cybersecurity]]></category><dc:creator><![CDATA[CCNet]]></dc:creator><pubDate>Fri, 06 Feb 2026 09:00:28 GMT</pubDate><media:content url="https://www.ccnet.de/en/blog/content/images/2026/02/EN-2.png" medium="image"/><content:encoded><![CDATA[<h2 id="management-summary">Management Summary</h2>
<img src="https://www.ccnet.de/en/blog/content/images/2026/02/EN-2.png" alt="Software supply chains The silent gateway"><p>Attacks via dependencies are no longer a fringe topic, but the most convenient shortcut into the heart of modern IT. The truth: most environments know their <strong>software supply chain</strong> only in fragments. Package managers resolve transitively, CI/CD distributes diligently, and no one notices when a component has been poisoned. Anyone who truly wants to reduce risk needs three things: a complete <strong>SBOM</strong>, strict <strong>Supply-Chain-Security</strong> policies, and operations that consistently enforce updates and blocklists &#x2013; not debate them.</p>
<h2 id="why-supply-chains-are-so-vulnerable">Why supply chains are so vulnerable</h2>
<ul>
<li><strong>Dependencies</strong> explode: a single service quickly brings hundreds of transitive packages.</li>
<li>Implicit trust: registries and mirrors are quietly treated as &#x201C;okay.&#x201D;</li>
<li>Attack vectors: typosquatting, dependency confusion, compromised maintainer accounts, malicious post-install scripts, poisoned build images, leaked CI secrets.</li>
<li>Lack of visibility: without <strong>SBOM</strong> and provenance evidence, no one knows <em>what</em> is actually running &#x2013; and <em>where</em> to patch.</li>
</ul>
<p>In short: the problem is not the single &#x201C;bad package,&#x201D; but the lack of evidence along the chain.</p>
<h2 id="minimum-controls-that-work-immediately">Minimum controls that work immediately</h2>
<ol>
<li>
<p><strong>SBOM as an operational document, not PDF decoration</strong></p>
<ul>
<li>Generate SBOMs per service <em>and</em> per build (not just per repo).</li>
<li>Version them in the artifact store, link them to tickets/changes.</li>
<li>Reference licenses, CVE status, criticality, and owner.</li>
</ul>
</li>
<li>
<p><strong>Repository hygiene &amp; package policy</strong></p>
<ul>
<li>Allowlist of registries, namespaces, and signatures.</li>
<li>Strict version pinning; no &#x201C;latest.&#x201D;</li>
<li>Blocklists for known malicious libraries, automatic fail-builds.</li>
<li>Secret scanning and commit signatures in all repos.</li>
</ul>
</li>
<li>
<p><strong>Provenance &amp; integrity</strong></p>
<ul>
<li>Evidence of &#x201C;who built <em>what</em> <em>when</em>&#x201D; (e.g., attestations on artifacts).</li>
<li>Reproducible builds, immutable artifact hashes, four-eyes approvals in CI/CD.</li>
<li>Least privilege for build tokens, short lifetimes, enforced rotation.</li>
</ul>
</li>
<li>
<p><strong>Update operations instead of update hope</strong></p>
<ul>
<li>Automated dependency PRs with risk labeling.</li>
<li>Fix-SLOs based on exposure (Internet vs. internal) and criticality.</li>
<li>&#x201C;Break-glass&#x201D; path for fast rollbacks including canary stages.</li>
</ul>
</li>
</ol>
<h2 id="kpis-that-make-maturity-visible">KPIs that make maturity visible</h2>
<ul>
<li><strong>SBOM coverage</strong>: % of services with current <strong>SBOM</strong> (build-accurate, &#x2264;7 days old).</li>
<li><strong>Time-to-Upgrade</strong>: median time to patch critical libs (Internet-exposed vs. internal).</li>
<li><strong>Pinned rate</strong>: share of strictly pinned <strong>dependencies</strong> without wildcards.</li>
<li><strong>Provenance rate</strong>: % of artifacts with signed origin and hash proof.</li>
<li><strong>Blocklist hits</strong>: number of builds prevented by policy &#x2013; yes, &#x201C;failures&#x201D; are a good sign here.</li>
<li><strong>Secret leaks</strong>: findings per month, time to rotation.</li>
</ul>
<p>These metrics belong in the same steering as MTTD/MTTR &#x2013; otherwise supply chain security remains folklore.</p>
<h2 id="90-day-plan-pragmatic-without-vendor-lock-in">90-day plan (pragmatic, without vendor lock-in)</h2>
<p><strong>Day 0&#x2013;15 &#x2013; Inventory &amp; policy</strong></p>
<ul>
<li>Inventory services, mark <em>critical</em> paths (Auth, Payment, Admin).</li>
<li>Define package policy: allowed registries, namespaces, signatures, pinning rules, blocklists.</li>
<li>Review CI/CD secrets: reduce privileges, shorten lifetimes, plan rotation.</li>
</ul>
<p><strong>Day 16&#x2013;45 &#x2013; Visibility &amp; stop criteria</strong></p>
<ul>
<li>Enable build-integrated <strong>SBOM</strong> generation and store in the artifact store.</li>
<li>Make provenance attestations and artifact hashes mandatory; build fails if missing.</li>
<li>Enable secret scanning and commit signatures; fail-build on findings/unsigned.</li>
</ul>
<p><strong>Day 46&#x2013;75 &#x2013; Fix operations &amp; practice</strong></p>
<ul>
<li>Enable automated update PRs; add risk labeling (criticality/exposure).</li>
<li>Technically enforce Fix-SLOs (e.g., auto-escalation on delay).</li>
<li>Drill: simulated malicious package discovery &#x2192; block, rollback, post-mortem with timings.</li>
</ul>
<p><strong>Day 76&#x2013;90 &#x2013; Anchor &amp; contracts</strong></p>
<ul>
<li>Compare KPIs against baseline, tighten measures.</li>
<li>Contractual minimum requirements in <strong>Supply-Chain-Security</strong>: mandatory SBOM delivery, 24/7 emergency contact, reporting deadlines, drill participation.</li>
<li>Feed lessons learned back into policy &amp; pipelines.</li>
</ul>
<h2 id="governance-without-theater">Governance without theater</h2>
<ul>
<li><em>One</em> source of truth: SBOM, policy files, attestations, blocklists &#x2013; centralized, versioned, audit-proof.</li>
<li>&#x201C;No evidence, no deploy&#x201D;: no release without <strong>SBOM</strong> and provenance.</li>
<li>N-tier view: critical sub-suppliers must also provide SBOM/attestations &#x2013; otherwise no access to core paths.</li>
<li>Security as a gate in the SDLC: without a passed gate no go-live, even if the feature deadline is pressing.</li>
</ul>
<h2 id="conclusion-evidence-instead-of-gut-feeling">Conclusion: evidence instead of gut feeling</h2>
<p>The <strong>software supply chain</strong> is only as secure as its evidence is reliable. With a clean <strong>SBOM</strong>, strict package policy, signed provenance, and enforced Fix-SLOs, risk decreases &#x2013; measurably. <strong>Open Source</strong> remains a competitive advantage if you enforce the rules. Otherwise, it&#x2019;s an invitation.</p>
]]></content:encoded></item><item><title><![CDATA[Close the entry gates: vulnerabilities, phishing, web apps]]></title><description><![CDATA[How companies close common entry points vulnerabilities phishing and insecure web applications using KPIs SLOs and a 90 day plan]]></description><link>https://www.ccnet.de/en/blog/close-the-entry-points-vulnerabilities-phishing-web-apps/</link><guid isPermaLink="false">69805be61fa63d476bec2051</guid><dc:creator><![CDATA[CCNet]]></dc:creator><pubDate>Mon, 02 Feb 2026 09:00:04 GMT</pubDate><media:content url="https://www.ccnet.de/en/blog/content/images/2026/02/EN.png" medium="image"/><content:encoded><![CDATA[<h2 id="why-these-three-doors-dominate">Why these three doors dominate</h2>
<img src="https://www.ccnet.de/en/blog/content/images/2026/02/EN.png" alt="Close the entry gates: vulnerabilities, phishing, web apps"><p>Uncomfortable but true: attackers don&#x2019;t need exotic exploits. In an above-average number of cases, open vulnerabilities, unrealistic awareness, and <strong>web applications</strong> with weak input validation are enough. The rest is speed. Defenders don&#x2019;t lose &#x201C;intelligence&#x201D; &#x2014; they lose discipline: missing patching SLOs, half-hearted MFA rollouts, no binding secure-coding standard. When <strong>IT security</strong> is treated as a project instead of an operation, gaps remain open &#x2014; sometimes for years.</p>
<h2 id="closing-vulnerabilities-from-%E2%80%9Cpatching%E2%80%9D-to-slo-driven-hygiene">Closing vulnerabilities: from &#x201C;patching&#x201D; to SLO-driven hygiene</h2>
<p>&#x201C;We patch regularly&#x201D; is not a quality metric. What matters is <em>how fast</em> critical gaps at the internet perimeter are closed &#x2014; and provably so.<br>
<strong>Mandatory controls:</strong></p>
<ul>
<li><strong>Inventory &amp; exposure</strong>: Complete asset inventory incl. internet exposure (system, version, owner, business relevance).</li>
<li><strong>Risk-based SLOs</strong>: Critical internet-facing vulnerabilities in days, internal ones in defined weeks. SLO breach &#x21D2; automatic escalation (change slot, management ping, approval enforcement).</li>
<li><strong>Canary &amp; staged rollout</strong>: Test ring first, then phased deployment. Rollback plan documented and rehearsed.</li>
<li><strong>Exception governance</strong>: Every deviation has an owner, a deadline, and compensation (e.g., additional hardening/monitoring).</li>
</ul>
<p><strong>KPIs:</strong> Patch SLO compliance (internet vs. internal), MTTD/MTTR by criticality, share of systems with current agent/scanner, <em>Mean Exposure Time</em> (MET) for critical CVEs.</p>
<h2 id="phishing-neutralization-technology-behavior-grounded-in-reality"><strong>Phishing</strong> neutralization: technology + behavior, grounded in reality</h2>
<p>Email is attackers&#x2019; favorite tool &#x2014; not because defenders are &#x201C;stupid,&#x201D; but because day-to-day pressure, delegation, and mobile approvals invite mistakes.<br>
<strong>Mandatory controls:</strong></p>
<ul>
<li><strong>Phishing-resistant MFA</strong> (passkeys/FIDO2) for all critical roles; disable legacy flows.</li>
<li><strong>Email authentication</strong> (SPF/DKIM/DMARC) plus anomaly detection and link/attachment policies.</li>
<li><strong>Session protection</strong> against AitM (e.g., re-challenge on risk signals, token binding).</li>
<li><strong>Realistic drills</strong>: Scenarios with time pressure, executive context, supplier narratives. No &#x201C;don&#x2019;t click&#x201D; theater &#x2014; process training instead (e.g., call-back verification, four-eyes principle, out-of-band approvals).</li>
</ul>
<p><strong>KPIs:</strong> MFA coverage (phishing-resistant), rate of blocked high-risk emails, time to alert confirmation (SecOps), share of positive verifications for payment/identity changes.</p>
<h2 id="securing-web-applications-from-the-sdlc-to-the-front-door">Securing <strong>web applications</strong>: from the SDLC to the front door</h2>
<p>Insecure <strong>web applications</strong> are not a &#x201C;developer problem&#x201D; &#x2014; they&#x2019;re a business risk. Shipping features without a security gate saves money in the wrong place.<br>
<strong>Mandatory controls:</strong></p>
<ul>
<li><strong>Secure SDLC</strong>: Binding coding standard, code reviews with security checks, secret scanning, dependency management (SBOM, Renovate/Dependabot equivalent).</li>
<li><strong>Pre-prod testing</strong>: DAST/SAST on critical flows (auth, upload, payment), abuse cases (rate limits, enumeration, CSRF).</li>
<li><strong>Around the app</strong>: WAF/reverse proxy with clear rules, hardened TLS/headers, bot management for login endpoints.</li>
<li><strong>Operations</strong>: Versioned configurations, reproducible deployments, emergency switches (feature flags), telemetry all the way to the business event.</li>
</ul>
<p><strong>KPIs:</strong> &#x201C;Time-to-fix&#x201D; for findings, percentage of critical endpoints with WAF policies, open vs. resolved findings per sprint, rate-limit hits vs. legitimate usage.</p>
<h2 id="90-day-plan-from-good-intentions-to-lived-control">90-day plan: from good intentions to lived control</h2>
<p><strong>Day 0&#x2013;15 &#x2013; transparency &amp; baseline</strong></p>
<ul>
<li>Complete asset and vulnerability inventory with internet exposure.</li>
<li>MFA posture: which critical roles use <em>phishing-resistant</em> methods?</li>
<li>Catalog <strong>web applications</strong>: critical flows, dependencies, test coverage.</li>
<li>KPI baseline: patch SLO compliance, MFA coverage, MTTD/MTTR, open app findings.</li>
</ul>
<p><strong>Day 16&#x2013;45 &#x2013; hardening &amp; SLO enforcement</strong></p>
<ul>
<li>Sharpen SLO policy (internet-critical in days). Enforce escalation logic <em>technically</em>.</li>
<li>Roll out phishing-resistant MFA; disable legacy protocols; session re-challenge on risk.</li>
<li>SDLC mandatory path: security review &amp; tests before every go-live. WAF baseline for login/payment/upload.</li>
</ul>
<p><strong>Day 46&#x2013;75 &#x2013; automate &amp; rehearse</strong></p>
<ul>
<li>Automated ticketing for critical CVEs; canary deployment pipelines.</li>
<li>Realistic <strong>phishing</strong> drills (executive/supplier narratives) with a clear call-back policy.</li>
<li>App drills: abuse scenarios (credential stuffing, mass download, enumeration) including rate-limit fine-tuning.</li>
</ul>
<p><strong>Day 76&#x2013;90 &#x2013; anchor impact</strong></p>
<ul>
<li>KPI review vs. baseline; sharpen measures.</li>
<li>&#x201C;Never go alone&#x201D; principle: no production change without a security checkpoint.</li>
<li>Quarterly steering: budget follows <em>demonstrable</em> risk reduction (SLO adherence, time to containment, fix rate per sprint).</li>
</ul>
<h2 id="minimal-architecture-less-friction-more-impact">Minimal architecture: less friction, more impact</h2>
<ul>
<li><strong>Central findings backlog</strong>: Security findings from scanners, reviews, WAF in <em>one</em> system &#x2014; prioritized by business impact.</li>
<li><strong>Telemetry mandate</strong>: endpoints, identities, <strong>web applications</strong> &#x2014; one consistent data path.</li>
<li><strong>Standard automations</strong>: isolate, lock account, create ticket, notify stakeholders &#x2014; without manual click-orgies.</li>
<li><strong>Exit plan</strong>: Documented migration path for every core component, so a vendor failure doesn&#x2019;t stall the program.</li>
</ul>
<h2 id="conclusion-discipline-beats-hope">Conclusion: discipline beats hope</h2>
<p>Attackers win with speed and simplicity. Defenders win with SLO-driven hygiene, <em>phishing-resistant</em> authentication, and an SDLC that enforces security as a gate. If you close these three doors consistently, attack surface, response times, and costs go down &#x2014; measurably, not emotionally.</p>
<h2 id="faq-about-blog-post">FAQ about blog post</h2>
<div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><b><strong style="white-space: pre-wrap;">What should companies prioritize first in IT security?</strong></b></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p><span style="white-space: pre-wrap;">Companies should patch internet-exposed vulnerabilities within days, deploy phishing-resistant MFA, and secure web applications with WAFs and mandatory SDLC security gates.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><b><strong style="white-space: pre-wrap;">How can patch discipline be proven in vulnerability management?</strong></b></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p><span style="white-space: pre-wrap;">Patch discipline is demonstrated by meeting defined SLOs and measuring Mean Exposure Time for each critical CVE.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><b><strong style="white-space: pre-wrap;">How can security awareness become realistic and effective?</strong></b></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p><span style="white-space: pre-wrap;">Effective security awareness relies on scenario-based phishing drills with time pressure, executive or supplier context, instead of slide-based training.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><b><strong style="white-space: pre-wrap;">What is the minimum security baseline for web applications?</strong></b></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p><span style="white-space: pre-wrap;">The minimum baseline includes a secure SDLC, regular DAST and SAST testing, rate limiting, and automated secrets scanning.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><b><strong style="white-space: pre-wrap;">Which KPIs are most important for IT and web security?</strong></b></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p><span style="white-space: pre-wrap;">Key KPIs include time to fix, the ratio of open versus resolved findings per sprint, and adherence to security SLOs.</span></p></div>
        </div>]]></content:encoded></item><item><title><![CDATA[Germany Under Pressure: Why Case Numbers Are Exploding]]></title><description><![CDATA[How companies close the three most common entry points vulnerability management phishing and insecure web apps with KPIs SLOs and a 90 day plan]]></description><link>https://www.ccnet.de/en/blog/germany-under-pressure-why-case-numbers-are-exploding/</link><guid isPermaLink="false">6979e5f01fa63d476bec202e</guid><dc:creator><![CDATA[CCNet]]></dc:creator><pubDate>Fri, 30 Jan 2026 09:00:38 GMT</pubDate><media:content url="https://www.ccnet.de/en/blog/content/images/2026/01/EN.png" medium="image"/><content:encoded><![CDATA[<h2 id="management-summary">Management Summary</h2>
<img src="https://www.ccnet.de/en/blog/content/images/2026/01/EN.png" alt="Germany Under Pressure: Why Case Numbers Are Exploding"><p>An uncomfortable diagnosis: <strong>Germany</strong> is economically attractive to <strong>ransomware</strong> actors. High value creation depth, dense supply chains, a strong SME sector &#x2014; combined with operational weaknesses in <strong>phishing</strong> defense, <strong>vulnerability</strong> remediation, and decision-making paths. In addition, a relatively high willingness to pay fuels the attacker economy. Anyone who does not counter this now with clear SLOs, well-practiced <strong>incident response</strong>, and consistent <strong>vulnerability management</strong> is financing the problem.</p>
<h2 id="why-germany-is-particularly-attractive">Why Germany Is Particularly Attractive</h2>
<ul>
<li><strong>Value creation &amp; dependencies:</strong> Industry-heavy processes, interconnected OT/IT, and tight just-in-time chains mean: every hour of downtime costs money. This increases negotiation pressure &#x2014; and thus the attractiveness for <strong>ransomware</strong>.</li>
<li><strong>SMEs &amp; hidden champions:</strong> Many operators are &#x201C;too big to ignore, too small for 24/7 security.&#x201D; There is a lack of capacity for monitoring, hardening, and exercises &#x2014; a red flag for attackers.</li>
<li><strong>Legacy &amp; complexity:</strong> Historically grown environments hinder standardization. Different locations, third-party systems, handover gaps &#x2014; all of this extends MTTD/MTTR.</li>
<li><strong>Insurance &amp; regulation:</strong> Stricter requirements create reporting pressure. Without lived controls, this turns into expensive rework instead of preventive impact.</li>
</ul>
<h2 id="the-real-entry-points-8020-without-romance">The Real Entry Points: 80/20 Without Romance</h2>
<p>Entry remains mundane &#x2014; and therefore successful:</p>
<ol>
<li><strong>Phishing</strong> &amp; social engineering: session theft, rushed approvals, abuse of authorization.</li>
<li>Unpatched <strong>vulnerabilities</strong>: exposed VPNs, gateways, web apps &#x2014; with widely available exploits.</li>
<li>Abuse of old accounts &amp; weak protocols: &#x201C;legacy&#x201D; is not romantic, it is an entry point.</li>
<li>Supply chain &amp; third-party access: missing minimum requirements, unclear contact paths, little logging.</li>
</ol>
<p>Conclusion: The problem is not a lack of &#x201C;new&#x201D; tools, but a lack of discipline in basic controls. <strong>Zero Trust</strong> (&#x201C;verify instead of trust&#x201D;) is not a slogan here, but an operating principle.</p>
<h2 id="willingness-to-pay-the-quiet-accelerator">Willingness to Pay: The Quiet Accelerator</h2>
<p>The economic logic is brutally simple: if payments work, the business model scales. Double/triple extortion (exfiltration before encryption, pressure via data protection, threats against partners) increases leverage. In interconnected supply chains, incidents quickly spill over to customers &#x2014; fear of secondary damage raises the willingness to negotiate. Anyone without a clear policy decides under stress &#x2014; usually at higher cost.</p>
<h2 id="measurable-countermeasures-immediately-actionable">Measurable Countermeasures (Immediately Actionable)</h2>
<ul>
<li><strong>Identities first:</strong> Phishing-resistant MFA (passkeys/FIDO2), shutdown of weak legacy flows, JIT privileges for admins. <strong>Zero Trust</strong> enforces continuous verification and least privilege.</li>
<li><strong>Patch SLOs with enforcement:</strong> Close critical internet-facing gaps within days, internal ones within defined weeks. Escalation for delays is automatic &#x2014; not &#x201C;send a reminder email.&#x201D;</li>
<li><strong>Email protection + reality-based awareness:</strong> Technical checks (authentication, anomalies) plus scenario training that simulates real pressure situations. <strong>Phishing</strong> workshops without practical relevance achieve little.</li>
<li><strong>Network brakes for lateral movement:</strong> Segmentation, application allowlisting, hardening of admin workstations, default blocking of risky scripting tools.</li>
<li><strong>Backups that help in time:</strong> Offline/immutable, time-stopped restore drills including integrity proof. Without practice, backups are just hope.</li>
<li><strong>Secure the supply chain:</strong> Minimum controls, validated access bridges, mandatory logging, event-driven tests. Clear emergency contact paths &#x2014; even outside business hours.</li>
</ul>
<h2 id="kpis-boards-must-see">KPIs Boards Must See</h2>
<ul>
<li><strong>MTTD/MTTR by criticality:</strong> How fast do we really detect and remediate?</li>
<li><strong>Patch SLO compliance:</strong> Adherence after exposure (internet vs. internal).</li>
<li><strong>MFA coverage (phishing-resistant):</strong> Share of critical roles using strong methods.</li>
<li><strong>Restore time &amp; verifiability:</strong> How long until core process X is running again &#x2014; verifiable, not a &#x201C;felt&#x201D; value.</li>
<li><strong>Identity hygiene:</strong> Orphaned accounts, key rotation/token rotation, share of JIT approvals.</li>
<li><strong>Supply chain fitness:</strong> Share of critical partners with proven minimum controls and practiced emergency paths.</li>
</ul>
<p>Without quarterly steering, KPIs remain decoration. Every deviation needs a defined response &#x2014; otherwise nothing changes.</p>
<h2 id="90-day-plan-for-germany-specific-risks">90-Day Plan for Germany-Specific Risks</h2>
<p><strong>Day 0&#x2013;15 &#x2013; Situational picture &amp; policy lock-in</strong></p>
<ul>
<li>Determine top 3 entry points based on facts (email, external apps, remote).</li>
<li>Finalize ransom policy and decision tree (including legal/communication paths).</li>
<li>Baseline: MTTD/MTTR, patch SLO compliance, MFA coverage, restore time.</li>
</ul>
<p><strong>Day 16&#x2013;45 &#x2013; Hardening &amp; consolidation</strong></p>
<ul>
<li>Roll out phishing-resistant MFA, disable legacy protocols, pilot JIT privileges.</li>
<li>Enforce patch SLOs technically; sharpen change windows &amp; escalation chain.</li>
<li>Minimally standardize supply chain controls; test emergency contact paths.</li>
</ul>
<p><strong>Day 46&#x2013;75 &#x2013; Automate &amp; practice</strong></p>
<ul>
<li>Automate standard responses (isolation, account lock, ticketing, alarm confirmation).</li>
<li>Time-stopped restore drill of a business-critical system incl. integrity proof.</li>
<li>Social engineering simulation with departments (approvals, four-eyes principle, out-of-band).</li>
</ul>
<p><strong>Day 76&#x2013;90 &#x2013; Anchor impact</strong></p>
<ul>
<li>KPI comparison to baseline; close gaps decisively.</li>
<li>Document exit plans for core providers (alternatives, migration steps).</li>
<li>Establish quarterly security steering: budget follows visible risk reduction.</li>
</ul>
<h2 id="conclusion-speed-clarity-discipline">Conclusion: Speed, Clarity, Discipline</h2>
<p>Case numbers are rising because the attack economy works &#x2014; and because operational discipline is lacking. The good news: with an identity focus, hard patch SLOs, practiced <strong>incident response</strong>, and resilient supply-chain paths, <strong>cyber risk</strong> drops noticeably. <strong>Germany</strong> remains an attractive target &#x2014; but not for companies that act consistently.</p>
<h2 id="faq-about-blog-post">FAQ about Blog Post</h2>
<div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><span style="white-space: pre-wrap;">Why is Germany attractive to perpetrators?</span></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">High added value, networked supply chains, often hesitant decision-making processes.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><span style="white-space: pre-wrap;">Which industries are particularly affected?</span></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">Industry, logistics, healthcare, and public services.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><span style="white-space: pre-wrap;">What reduces negotiation pressure?</span></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">A well-practiced restore chain, clear communication matrix, ransom policy.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><span style="white-space: pre-wrap;">What is a typical &#x201C;German&#x201D; weakness?</span></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">Legacy landscapes + silos &#x2192; long MTTD/MTTR.</span></p></div>
        </div><div class="kg-card kg-toggle-card" data-kg-toggle-state="close">
            <div class="kg-toggle-heading">
                <h4 class="kg-toggle-heading-text"><span style="white-space: pre-wrap;">What are the first steps?</span></h4>
                <button class="kg-toggle-card-icon">
                    <svg id="Regular" xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24">
                        <path class="cls-1" d="M23.25,7.311,12.53,18.03a.749.749,0,0,1-1.06,0L.75,7.311"/>
                    </svg>
                </button>
            </div>
            <div class="kg-toggle-content"><p dir="ltr"><span style="white-space: pre-wrap;">Enforce MFA rigorously, patch SLOs with escalation, supply chain controls.</span></p></div>
        </div>]]></content:encoded></item><item><title><![CDATA[Ransomware: A Business Model Scales]]></title><description><![CDATA[Why ransomware thrives with RaaS and how organizations can measurably improve incident response and resilience in 90 days.]]></description><link>https://www.ccnet.de/en/blog/untitled-9/</link><guid isPermaLink="false">697724831fa63d476bec2018</guid><category><![CDATA[Cybersecurity]]></category><dc:creator><![CDATA[CCNet]]></dc:creator><pubDate>Mon, 26 Jan 2026 09:00:36 GMT</pubDate><media:content url="https://www.ccnet.de/en/blog/content/images/2026/01/Banner-4-IT.png" medium="image"/><content:encoded><![CDATA[<h2 id="management-summary">Management Summary</h2>
<img src="https://www.ccnet.de/en/blog/content/images/2026/01/Banner-4-IT.png" alt="Ransomware: A Business Model Scales"><p>The hard truth: <strong>ransomware</strong> is no longer a &#x201C;special case,&#x201D; but industrial day-to-day business for attackers. The <strong>RaaS</strong> model lowers entry barriers, professionalizes processes, and spreads risk across many actors. Organizations fail less because of missing tools than because of a lack of discipline in basic controls, clear decision paths, and rehearsed playbooks. Anyone who hasn&#x2019;t defined robust time targets and emergency bridges ends up paying twice during an incident: once to the attackers&#x2014;and a second time during recovery.</p>
<h2 id="why-raas-changes-everything">Why <strong>RaaS</strong> changes everything</h2>
<p>In the past, a full perpetrator team was required&#x2014;technology, infrastructure, and money-laundering channels. <strong>RaaS</strong> decouples this: developers provide toolkits, affiliates handle initial access, others take care of negotiation and monetization. The result: more campaigns, faster iteration, better &#x201C;customer support&#x201D; on the attacker side. For defenders this means attacks arrive more frequently, in more variants, and with greater professionalism. A one-off? No&#x2014;this is a scaling ecosystem with clear incentives.</p>
<h2 id="tactics-entry-points-the-8020-levers">Tactics &amp; entry points: the 80/20 levers</h2>
<p>Most successful cases still begin through the same doors:</p>
<ul>
<li><strong>Phishing</strong> and social engineering: credentials, session cookies, rushed approvals.</li>
<li>Unpatched <strong>vulnerabilities</strong> in internet-exposed services (VPNs, gateways, web apps).</li>
<li>Compromised access from third-party systems or via credential stuffing.</li>
<li>Abuse of <strong>LOTL</strong> techniques (Living off the Land) to operate in the network without &#x201C;loud&#x201D; malware.</li>
</ul>
<p>Defenders lose time in complex tool landscapes while attackers move fast with standard building blocks. The consequence: reduce friction, increase reliability, set hard SLOs&#x2014;instead of getting lost in cosmetic measures.</p>
<h2 id="economic-logic-why-numbers-rise%E2%80%94and-stay-high">Economic logic: why numbers rise&#x2014;and stay high</h2>
<p><strong>Ransomware</strong> remains attractive because the margins work. Data exfiltration before encryption (&#x201C;double/triple extortion&#x201D;) maximizes pressure, even when backups exist. At the same time, many organizations are embedded in supply chains: an incident doesn&#x2019;t just create internal costs, it triggers contractual penalties, disclosure obligations, and operational downtime for partners. As long as these cascades translate into money, the incentive structure for attackers remains stable&#x2014;regardless of individual arrests or takedowns.</p>
<h2 id="what-works-immediately%E2%80%94without-sugarcoating">What works immediately&#x2014;without sugarcoating</h2>
<ul>
<li><strong>Harden identities:</strong> Phishing-resistant MFA (e.g., passkeys/FIDO2), disable weak legacy flows, end-to-end session monitoring. <strong>Zero Trust</strong> means: verify, don&#x2019;t hope.</li>
<li><strong>Make patch SLOs binding:</strong> Internet-exposed criticalities in days; internal gaps with clear deadlines. SLO breaches trigger automatic escalation&#x2014;not emails.</li>
<li><strong>Email protection + realism-based awareness:</strong> Technical checks (authentication, anomalies) combined with scenario-based training that simulates real pressure tactics.</li>
<li><strong>Backups that actually help:</strong> Offline/immutable, restore tests under time pressure, proof of integrity. Without drills, backups are just hope.</li>
<li><strong>Brake lateral movement:</strong> Network segmentation, app allowlisting, default blocking of dangerous scripting tools, hardening of admin workstations.</li>
<li><strong>Secure supply-chain interfaces:</strong> Minimum requirements, access only via vetted bridges, logging obligations, and event-driven testing.</li>
</ul>
<h2 id="90-day-plan-against-ransomware">90-day plan against <strong>ransomware</strong></h2>
<p><strong>Day 0&#x2013;15 &#x2013; Situation &amp; baseline</strong></p>
<ul>
<li>Identify the top 3 entry points (email, external apps, remote access) and substantiate with facts.</li>
<li>Capture KPI baselines: MTTD/MTTR by criticality, patch-SLO compliance, MFA coverage, restore time.</li>
<li>Update roles &amp; approval matrix for <strong>incident response</strong> (including authorities and communication paths).</li>
</ul>
<p><strong>Day 16&#x2013;45 &#x2013; Hardening &amp; acceleration</strong></p>
<ul>
<li>Roll out phishing-resistant MFA, disable legacy protocols, pilot JIT privileges for admins.</li>
<li>Enforce patch SLOs (change windows, enforcement rights, escalation logic).</li>
<li>Draw sharp network segments; operate admin workstations and critical servers with elevated policies.</li>
</ul>
<p><strong>Day 46&#x2013;75 &#x2013; Automate &amp; test</strong></p>
<ul>
<li>Automate standard responses: isolation, account lock, ticketing, alert confirmation.</li>
<li>Restore drill: timed recovery of a business-critical system including integrity proof.</li>
<li>Supply chain: rehearse emergency contacts, change-freeze processes, and protocols for access providers.</li>
</ul>
<p><strong>Day 76&#x2013;90 &#x2013; Anchor impact</strong></p>
<ul>
<li>Review KPIs vs. baseline: MTTD/MTTR down, patch-SLO rate up, restore time down.</li>
<li>Finalize ransom policy and decision tree (including legal guardrails).</li>
<li>Fix quarterly steering: budget follows proven risk reduction&#x2014;not gut feeling.</li>
</ul>
<h2 id="communication-decision-logic-in-an-incident">Communication &amp; decision logic in an incident</h2>
<p>The biggest cost driver is time lost to uncertainty. Define in advance:</p>
<ul>
<li>Who decides on production shutdown, external forensics, communication to customers/authorities?</li>
<li>Which criteria trigger which escalation (e.g., exfiltration indicators, active encryption, supply chain affected)?</li>
<li>Which out-of-band channels are used if primary systems are unreliable?</li>
</ul>
<h2 id="conclusion-discipline-beats-a-tool-zoo">Conclusion: discipline beats a tool zoo</h2>
<p><strong>Ransomware</strong> isn&#x2019;t going away&#x2014;it pays. Defenders win with speed, clarity, and practice: secure identities, close gaps in days, rehearse restoration with proof, and hard-wire decisions in advance. This isn&#x2019;t &#x201C;nice to have&#x201D;; it&#x2019;s your cost airbag. Anyone who executes the 90-day plan cleanly reduces damage and negotiation pressure&#x2014;and makes <strong>RaaS</strong> a bit less profitable.</p>
]]></content:encoded></item></channel></rss>