Cybersecurity Best Practices: Tips From Sebastian Gierlinger, VP of Engineering at Storyblok
Storyblok is the first headless CMS that works for developers & marketers alike.
)
- Read more about Storyblok's enterprise-grade security measures in our Trust Center (opens in a new window)
- Try Storyblok for free today (opens in a new window)
"Everyone should be aware that the security landscape has changed tremendously."
If youâre a CMS user, those words are enough to send a chill down your spine. The ever-accelerating pace of technology has introduced countless opportunities, but itâs not without its risks. Keeping up with evolving security threats can feel like a full-time job.
But donât worry â you donât need to be a security expert to be prepared. We sat down with Sebastian Gierlinger, our VP of Engineering and provider of that quote, to pick his brain on cybersecurity best practices. Check out his insights to stay on top of todayâs biggest threats.
Security begins with you
With all the external threats to worry about, it might seem counterintuitive to look inwards. But Sebastian tells us that keeping everything secure takes rigorous maintenance from you and your teams. And the best way to do that?
âRegular security trainings,â he advises, âabout twice a year.â In addition to basic security practices like secure password management (opens in a new window), Sebastian recommends using these trainings to cover some of the bigger risks too. Phishing attacks â where a bad actor impersonates a trusted source to get vital information â are particularly alarming to him. âIf youâre not a skeptical person, itâs very easy to fall for these attacks,â he tells us.
Sebastian highlights internal phishing simulators as crucial tools. Theyâre an efficient way to identify team members who could benefit from a little more training.
Engineering teams should be wary, too. In addition to consistently reviewing secure coding standards, teams should also be threat modeling. Threat modeling is the systematic process of examining your system, coming up with possible attacks against it, and planning countermeasures.
Learn more about threat modeling at the OWASP Foundation.
Sebastian also advises the importance of knowing your own system: âKnow where your critical data is stored,â he advises. Itâs not just about familiarity. Itâs about having full visibility of any potential weak points and being able to communicate them to the teams that rely on it. âIf everyone is informed, everyone can play a role in maintaining your site security.â
Know who youâre working with
Itâs not just internal systems that you should be monitoring, though. âThe majority of your data now lives on the cloud,â Sebastian highlights. If you use products like Google Workspace, AWS, or Salesforce, your dataâs in the cloud, too.
Even if you donât use the cloud yet, youâll be relying on it sooner rather than later: âSome industries are a little bit further down the path and there is more stored on the cloud than in other industries, or maybe that still use on-premise software service, but in general everything is moving in this direction. Thereâs not a single industry that wonât be affected by the move to the cloud.â
Storing data on the cloud can be incredibly helpful, but it also opens you up to risks. That means the tools you work with need to be just as secure as your own tech, or you risk bad actors getting to your data through the cloud. A chain is only as strong as its weakest link, after all.
One way to vet your tools is with security certifications. Certifications like ISO 27001 (opens in a new window) can only be earned through rigorous adherence to the highest international tech safety standards. Itâs an easy way to make sure you can trust the vendors you work with.
However, Sebastian cautions against treating certifications as end-all be-alls: âFor companies in a B2B context, it can be good to have security certifications, because itâs a shortcut to prove youâre working in a secure way. But it presents a certain problem for startups and smaller companies as [getting certified] is a huge financial commitment. You canât get away with it for below $50,000. And spending $50,000 for a certification for a startup is quite the commitment.â
By limiting yourself to only vendors with certifications, youâre limiting your market choices to only big, cash-flush players â and thereâs no promise that these will be the best fit for your company. Thereâs no hard and fast rule for when to require ISO 27001 or any other certification, for that matter. But Sebastian offers a glimpse into how Storyblok makes the decision:
- Step 1:Determine how sensitive any info youâll share with the vendor is.
- Step 2: Raise your security standards for the vendor to that level. The more important or sensitive the data is, the more rigorous your standards should be.
- Step 3: Send out security questionnaires that ensure your partners are on the same page with their security standards. ââDo you do regular access checks?â, âHow do you host our data?â, âHow do your backups work?â Stuff like that.â
Regardless of whether a vendor is certified, Sebastian still recommends doing your own research. âCheck the trust centers. Thereâs a lot of information out there that you can get for free, without even asking. Make yourself familiar with what theyâre doing.â
Classify your information
âThe most important thing that many companies donât do â and thatâs the reason why some of them fail â is they donât know where the critical data is really stored,â Sebastian stresses. And no one is immune to this pitfall. Large or small, established or startup, it doesnât matter â if youâre sharing your data with unsecured partners, youâre at risk.
The best correction? âYou need to first map out in what systems this information is stored,â Sebastian advises. âThen, you can come up with a proper protection policy. That normally means you come up with a classification scheme: highly confidential, confidential, public, and so on. Once you have categories, they can be applied to different systems. Then you can communicate to everyone how to deal with the data thatâs stored in those systems.â This classification should be a regular part of any new system integration.
Make sure that both the classification and the behavior it entails are clear. Whether a frequent user or a one-time collaborator, keeping expectations clear for all users ensures that data will be handled properly.
Balancing innovation with security
With the importance of secure operation and the essential need to vet any new vendors, itâs easy to feel like your growth is restricted. Striking a balance between innovation and security â making progress and doing it safely â presents a unique challenge.
âItâs a good question,â says Sebastian. âInnovation is necessary, or else you fall behind. I would highly suggest already thinking about security during the innovation process.â Thinking of the two needs like partners rather than competitors can keep you moving swiftly and safely. Sebastian recommends threat modeling before any development begins, considering security implications carefully, and picking your partners wisely.
AI and security
Artificial Intelligence (AI) and Large Language Models (LLMs) have opened up a whole new world of possibilities for customers and brands alike. But Sebastian warns us that it isnât all roses: âHonestly, from a security perspective, AI is terrible. No, seriously, itâs terrible. There are so many new threats that are coming upâŚ. Itâs becoming more and more complicated for us to defend against these attacks.â
One big risk is the rise of deepfakes. These digitally altered assets can be used to impersonate nearly anybody and manipulate your trust to obtain sensitive data. Nobody is safe from them â not even world leaders like President Zelenskyy (opens in a new window). With the help of AI, even novice users with very little skill can produce targeted, convincing impersonations.
The same goes for more traditional hacking. Your average user is now only a few prompts away from learning every security vulnerability of your CMS and the best ways to exploit them. To make his point, Sebastian pulled up an AI engine, asked for the best way to hack a CMS, and â quite alarmingly â got a detailed, step-by-step guide in seconds. It even went as far as to suggest the best tools for the job. When everyone has easy access to hacking know-how, nobody is truly safe.
However, Sebastian assures there are steps you can take to keep yourself out of trouble. The first is to maintain a healthy level of skepticism and be cautious about the information you send. You should also pick an authorized, secure method of communication with your team members. That way, if any contact is made outside of those channels, itâs an immediate sign to be wary of what youâre hearing.
Avoid channels that external collaborators can easily access, like Discord or email, if you want an extra layer of security.
Thereâs still something to be optimistic about with AI and security, though: the power of AI doesnât belong to bad actors alone. You can leverage its strengths to protect yourself, too. Sebastian recommends using it during your threat modeling phase to predict potential assaults that bad actors with the same info might try. This allows you to shore up your defenses before they can strike.
Staying up to date with security
As tech like AI continues to evolve, so does the need to safeguard yourself. Losing data to bad actors has a host of dire consequences, not the least of which is potential legal action if there was something you could have done to prevent it.
Sebastianâs advice? âGet a lawyer!â
But there are less litigious steps you can take, too. Staying informed about threats is half the battle â and depending on what certifications youâre after, it might even come up in the audits. Join cybersecurity forums, sign up for industry-relevant LinkedIn mailing lists, and set Google alerts so you can stay on top of security news.
When it comes to staying up to date with more specific regulations, like GDPR (opens in a new window), Sebastian says itâs best to go directly to the source. âI highly recommend going straight to the regulatory bodies. They are doing a good job in communicating what they would like to have and what they would like to see.â All we have to do, he assures, is listen.
Final thoughts
The bottom line? Knowledge is power. The more youâre aware of the state of security, the better you know your tech stack and potential risks, the more informed you are about repelling threats, the safer you are. Sebastian also recommends a healthy dose of alarm: âItâs good to have a sense of panic about security. That way, someoneâs always taking care of it.â
Thereâs a lot on the line when it comes to keeping your CMS safe. But alongside vigilance, Sebastian advises patience, too. Be diligent, be careful, and if any missteps do happen, be prepared to recover and grow from them. âItâs a learning process in the end.â