Internet operations management (IOM) refers to the technology components involved in creating a security program to automatically track all known and unknown internet-facing assets belonging to an organization's network, prioritizing them for remediation and automatically deploying playbooks to remediate critical vulnerabilities in their network.
It is the combination of automated public asset discovery and automated remediation commonly employed by a security operations center (SOC) to accurately inventory an organization’s global internet-facing assets and resource their remediation using automation and analysts.
IOM is critical because it combines two key components of security operations management: discovery and remediation. It helps organizations manage their internet-connected assets, discover shadow IT and unknown exposures, and automatically remediate them to improve key operational metrics that every SOC is concerned about – mean time to discovery (MTTD) and mean time to remediation (MTTR).
By combining two critical operational management functions, an organization's SOC can deploy its security technology and limited SOC analyst resources toward more strategic initiatives.
Any good internet operations management program needs to combine an attack surface management (ASM) technology with a security orchestration, automation and response (SOAR) technology.
Hostile nation-states and other bad actors relentlessly probe the internet and networks of federal, state and local governments to find vulnerabilities to exploit. Internet operations management empowers government organizations to remediate vulnerable assets before malicious actors get to them.
An IOM program can help governments with:
"As noted in last year's report, CISA's ability to discover and guide remediation of critical vulnerabilities across federal civilian executive branch agencies is hindered by limited situational awareness that is overly dependent on manual self-reporting and persistent visibility gaps across federal civilian internet-accessible cyber terrain. To effectively become the operational lead for federal civilian cybersecurity, CISA is directed to continue adopting processes and state-of-the-art technology similar to those used by DoD for its Internet Operations Management.
[House Report 117-396, From the U.S. Government Publishing Office]
The United States government has issued a recommendation to government institutions to build a robust internet operations management program to improve the operations management of their security operations center (SOC) to be able to discover and guide remediation of critical vulnerabilities across federal civilian executive branch agencies.
Want to learn more about internet operations management? Please visit this page.