netnet-logo 2
  • Home
  • who we are
  • What we do
  • How we do it
  • who we serve
  • Resources
    • Win(win)
    • Contact us
    • Blog
    • Newsletter Archive
    • White Papers
    • Case Studies
    • Video Library
    • News
Contact Us
  • There are no suggestions because the search field is empty.
facebook
Vector
icons8-twitter-24 (1)
Group

SolarWinds Breach: Three Lessons You Need to Heed

avatar

Dave Young

Dec. 30,2020 | Security, Software, Managed Services, Maintenance and Support, Operations, Infrastructure

What do the Pentagon, the U.S. State Department, The White House, the NSA, all five branches of the US military, the top ten U.S. telecommunications companies, and four hundred twenty-five of the Fortune 500 all have in common? Given the title of this article, you already have a clue, which is that they are all SolarWinds customers. Those are just some of the higher profile organizations, but in all there are 300k SolarWinds customers around the world, with about 18k identified as impacted. The impact of this breach is so far and deep, the actual repercussions will not be fully understood for years potentially. However, we don’t have to wait years, months, or even days to fully understand the lessons learned, some security norms that need to be challenged, and what should be done next.

First, a high-level summary of what actually happened. In short, a SolarWinds product called Orion that provides “Centralized monitoring and management of your entire IT stack, from infrastructure to application” (source: SolarWinds), has a service that automatically updates the software on a regular basis for customers. It’s that service that was infected deliberately with malware, thus every time a customer’s Orion platform received an update, it also received the malware. Given the nature of Orion’s reach into each customer’s IT stack, it enabled broad access to the perpetrators to steal data. Layered on top of this attack, further vulnerabilities were found with VMWare products (VMWare Access and VMWare Identity Manager). Once hackers were able to penetrate a system via SolarWinds’ Orion, many were then able to take advantage being on the inside a company’s network, of VMWare’s vulnerability, which to put it mildly, is a bit scary. Put simply, the VMWare vulnerability enabled creation of authentication tokens which could be used to access email, APIs, and a host of other protected data according to the NSA.

First Lesson: Zero Trust Security

“Be careful who you trust…the devil was once an angel.” Unknown

What was particularly devious about this attack was how the hackers used trusted sources to deliver their malware. By infiltrating a trusted source first, the delivery method became almost unstoppable. Almost anyone who buys software trusts the provider when they send an update. When is the last time you denied your phone a software update coming from the provider? In this case, by hacking the update delivery system for the Orion platform, customers were welcoming the malware into their environment since it was coming from a trusted source. What makes this somewhat ironic is customers receiving these automatic updates were doing one of the most basic elements of good security: patching their systems.

Going forward, organizations must adopt a zero-trust methodology. A great definition from Crowdstrike:

Zero Trust is a security concept that requires all users, even those inside the organization's enterprise network, to be authenticated, authorized, and continuously validating security configuration and posture, before being granted or keeping access to applications and data.

Traditional access technologies, like VPN, rely on antiquated trust principles, which has resulted in compromised user credentials which have led to breaches. IT needs to rethink its access model and technologies to ensure the business is secure, while still enabling fast and simple access for all users (including 3rd party users). Zero Trust security can reduce risk and complexity, while delivering a consistent user experience.

Enterprise access and security is complex and constantly changing. Traditional enterprise technologies are complex and making changes often takes days (and often across many hardware and software components) using valuable resources. A Zero Trust security model can reduce FTE hours and architectural complexity.

Second Lesson: Best Practices (for who)?

“Assumptions are made, and most assumptions are wrong.” Albert Einstein

For me, best practices are another way to say assumptions. In my view, companies need to develop their own stringent methodologies based on threat vectors identified that are specific to their environment. This notion of “best practices” is a major contributor to the poor state of security in many corporations and their difficulties detecting a breach with anything less than the intruder blowing the entire infrastructure to pieces. Yes, we can always learn what others are doing to mitigate risk, but more often than not, organizations are using them to check off security boxes without the in-depth analysis to ensure its should be their best practice.

The only best practice I would recommend, is that IT organizations treat specialized IT security as an ongoing, operational cost. Far too many firms with a high-risk factor treat security as a ‘once in a while’ investment and check-up, rather than an ongoing, aggressive campaign that never ends.

Third Lesson: Resources

“Most business meetings involve one party elaborately suppressing a wish to shout at the other: 'just give us the money'.” Alain de Botton

Zero trust policies and proactive security management take money. There is no other way to say it. If you aren’t going to allocate the budget and resources to protect your data and working environment, then you probably don’t deserve to enjoy peace of mind. Technology has afforded vast transformation across IT enabling companies to do more with far less. It may be time to aim that transformation focus and realized gains back to securing it all. Taking a Zero Trust security approach is costly, complex, resource intensive, requires special security skills, and requires a substantial commitment from the organization. Consider how long it would take the current security technicians to perform a full top-down assessment if they had to do that in addition to their current workload? During that time, vulnerabilities will continuously be introduced in the environment, and some of them may remain unknown until the next audit, so there’s quite a large window for a threat actor to use it.

Said another way, do you think SolarWinds wished it would have invested more in configuration change management and ongoing security reviews?

There are many lessons and take always that could be added to this list but suffice it to say that if you only take heed to these three and implement change to ensure their covered, the organization will thank you (eventually). NET(net) specializes in helping companies fund transformation efforts by streamlining their technology supply chain, and optimizing IT spend. Maybe we can help you find the budget you need to find the budget for operational security that supports a zero-trust environment.

About NET(net)

Founded in 2002, NET(net) is the world’s leading IT Investment Optimization firm, helping clients find, get and keep more economic and strategic value. With over 2,500 clients around the world in nearly all industries and geographies, and with the experience of over 25,000 field engagements with over 250 technology suppliers in XaaS, Cloud, Hardware, Software, Services, Healthcare, Outsourcing, Infrastructure, Telecommunications, and other areas of IT spend, resulting in incremental client captured value in excess of $250 billion since 2002. NET(net) has the expertise you need, the experience you want, and the performance you demand. Contact us today at info@netnetweb.com, visit us online at www.netnetweb.com, or call us at +1-866-2-NET-net to see if we can help you capture more value in your IT investments, agreements, and relationships.

NET(net)’s Website/Blogs/Articles and other content is subject to NET(net)’s legal terms offered for general information purposes only, and while NET(net) may offer views and opinions regarding the subject matter, such views and opinions are not intended to malign or disparage any other company or other individual or group.

Read similar posts below

By Fred Teekens - Mar. 27,2025

European Tech Leaders Mitigating Geopolitical Risk

READ MORE
By Andrea Alterman - Apr. 29,2021

Top 10 HCM HRMS Suppliers for 2021

READ MORE
By Dave Young - Feb. 27,2020

Security Operations Center: Insource or Outsource to MSSP?

READ MORE
Top12ReasonsWhyHealthcareProvidersPayWAYtOOMuchforIT-2-1

Top 12 Reasons Why: Healthcare Providers Pay WAY TOO Much for IT

Download Free PDF
Top10WaystoDefendYourselffromanOracleAudit-2

Top 10 Ways to Defend Yourself from an Oracle Audit

Download Free PDF
SLS5WaysToManageMicrosoft

SLS 5 Ways To Manage Microsoft

Download Free PDF
Top_7_reasons_Youre_Overpaying _Microsoft - 2017

Top 7 Reasons You’re Overpaying Microsoft – 2017

Download Free PDF
SupplierLockInRisk

Supplier Lock In Risk

Download Free PDF
SLSTheComplianceGambit

SLS The Compliance Gambit

Download Free PDF
SLSMicrosoftLargeAccountResellers

SLS Microsoft Large Account Resellers

Download Free PDF
SLSHiddenFinancialOpportunityinMicrosoft

SLS Hidden Financial Opportunity in Microsoft

Download Free PDF
OverpayingforTelecommunications

Overpaying for Telecommunications

Download Free PDF
OutsourcingGovernanceGuidelines

Outsourcing Governance Guidelines

Download Free PDF
OutsourcingAgreementCrisis

Outsourcing Agreement Crisis

Download Free PDF
OracleThirdPartySupport-1

Oracle Third Party Support

Download Free PDF
cover-book

The Two Greatest Threats to the Banking Industry - Part I: The Case for the Digital Bank

Download Free PDF
OptimizePersuasiveness

Top 12 Reasons Why: Healthcare Providers Pay WAY TOO Much for IT

Download Free PDF
DCSDisasterRecoveryPlanning-1

DCS Disaster Recovery Planning

Download Free PDF
AnInsideLookatSalesforce

An Inside Look at Salesforce

Download Free PDF
MOST POPULAR

image
Top 20 Mainframe Software Suppliers
Steven Zolman
image
Guide: Selecting the Right Microsoft LSP (Licensing Solution Partner)
Scott Braden
image
Top 5 Technology Research Services Firms for 2022
Steven Zolman

Companies overpay average 40% on IT services. Do you?

Learn More
footer logo

Sign up to receive updates

  • Who we are
  • What we do
  • How we do it
  • Who we serve
  • Ethics

  • Resources
  • Contact us
  • Blog
  • Newsletter Archive
  • White Papers
  • Case Studies
  • Video Library
  • News
  • Facebook
  • Instagram
  • twitter
  • linkedin

+1 616.546.3100

info@netnetweb.com

Copyright © 2026 Netnetweb. All Rights Reserved